Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rinvoice.exe

Overview

General Information

Sample name:rinvoice.exe
Analysis ID:1465644
MD5:70921b4a6f2b97263e1a1f48efe7763b
SHA1:dc48ad9c39209bb3e3e94f3b35518f3bba9066eb
SHA256:706f1b6ec843638107f441e0b2d266b997e26ca4d1a040d94bf085740ddcf16c
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rinvoice.exe (PID: 6748 cmdline: "C:\Users\user\Desktop\rinvoice.exe" MD5: 70921B4A6F2B97263E1A1F48EFE7763B)
    • RegSvcs.exe (PID: 6816 cmdline: "C:\Users\user\Desktop\rinvoice.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.uniform.gr", "Username": "sender@uniform.gr", "Password": "k!+]7rf9nW!S20"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1710014632.0000000000EA0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 92 88 44 24 2B 88 44 24 2F B0 B2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          1.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 92 88 44 24 2B 88 44 24 2F B0 B2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          1.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 92 88 44 24 2B 88 44 24 2F B0 B2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          1.2.RegSvcs.exe.2760326.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            1.2.RegSvcs.exe.2760326.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.RegSvcs.exe.2760326.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 70 entries

                System Summary

                barindex
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.25.23.138, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6816, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.uniform.gr", "Username": "sender@uniform.gr", "Password": "k!+]7rf9nW!S20"}
                Source: rinvoice.exeReversingLabs: Detection: 36%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: rinvoice.exeJoe Sandbox ML: detected
                Source: rinvoice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: rinvoice.exe, 00000000.00000003.1708759139.0000000003770000.00000004.00001000.00020000.00000000.sdmp, rinvoice.exe, 00000000.00000003.1706970894.00000000038C0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: rinvoice.exe, 00000000.00000003.1708759139.0000000003770000.00000004.00001000.00020000.00000000.sdmp, rinvoice.exe, 00000000.00000003.1706970894.00000000038C0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00804696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00804696
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0080C9C7
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080C93C FindFirstFileW,FindClose,0_2_0080C93C
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080F200
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080F35D
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0080F65E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00803A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00803A2B
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00803D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00803D4E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0080BF27

                Networking

                barindex
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: global trafficTCP traffic: 192.168.2.4:49731 -> 185.25.23.138:587
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                Source: Joe Sandbox ViewASN Name: POINTERGR POINTERGR
                Source: unknownDNS query: name: ip-api.com
                Source: global trafficTCP traffic: 192.168.2.4:49731 -> 185.25.23.138:587
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_008125E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_008125E2
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: global trafficDNS traffic detected: DNS query: mail.uniform.gr
                Source: RegSvcs.exe, 00000001.00000002.2950571059.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                Source: RegSvcs.exe, 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                Source: RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.uniform.gr
                Source: RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0#
                Source: RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: RegSvcs.exe, 00000001.00000002.2950571059.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000001.00000002.2949629941.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: RegSvcs.exe, 00000001.00000002.2949629941.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: RegSvcs.exe, 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, SKTzxzsJw.cs.Net Code: oW4h
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0081425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0081425A
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00814458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00814458
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0081425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0081425A
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00800219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00800219
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0082CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0082CDAC

                System Summary

                barindex
                Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2760326.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.rinvoice.exe.ea0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.3ac3d90.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.29e0ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.275f43e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.4f50000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.29e0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.3a76458.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.1710014632.0000000000EA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000001.00000002.2949414991.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: This is a third-party compiled AutoIt script.0_2_007A3B4C
                Source: rinvoice.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: rinvoice.exe, 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2b31baca-b
                Source: rinvoice.exe, 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_286ade65-4
                Source: rinvoice.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7c874502-0
                Source: rinvoice.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_809002b2-d
                Source: initial sampleStatic PE information: Filename: rinvoice.exe
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_008040B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_008040B1
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007F8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F8858
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0080545F
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007AE8000_2_007AE800
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CDBB50_2_007CDBB5
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007AE0600_2_007AE060
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0082804A0_2_0082804A
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007B41400_2_007B4140
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C24050_2_007C2405
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D65220_2_007D6522
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D267E0_2_007D267E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_008206650_2_00820665
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007B68430_2_007B6843
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C283A0_2_007C283A
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D89DF0_2_007D89DF
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00820AE20_2_00820AE2
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007B8A0E0_2_007B8A0E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D6A940_2_007D6A94
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007FEB070_2_007FEB07
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00808B130_2_00808B13
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CCD610_2_007CCD61
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D70060_2_007D7006
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007B710E0_2_007B710E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007B31900_2_007B3190
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A12870_2_007A1287
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C33C70_2_007C33C7
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CF4190_2_007CF419
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C16C40_2_007C16C4
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007B56800_2_007B5680
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C78D30_2_007C78D3
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007B58C00_2_007B58C0
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C1BB80_2_007C1BB8
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D9D050_2_007D9D05
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007AFE400_2_007AFE40
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CBFE60_2_007CBFE6
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C1FD00_2_007C1FD0
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00DD36100_2_00DD3610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040DC111_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00407C3F1_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00418CCC1_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00406CA01_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004028B01_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041A4BE1_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004182441_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004016501_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F201_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004193C41_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004187881_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F891_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402B901_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004073A01_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_025DDAD01_2_025DDAD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_025DCEB81_2_025DCEB8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_025DD2001_2_025DD200
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_025D0FD01_2_025D0FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_025D10301_2_025D1030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064367401_2_06436740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064357AF1_2_064357AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064321B01_2_064321B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064309D01_2_064309D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06431AC01_2_06431AC0
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: String function: 007C0D27 appears 70 times
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: String function: 007A7F41 appears 35 times
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: String function: 007C8B40 appears 42 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
                Source: rinvoice.exe, 00000000.00000002.1710014632.0000000000EA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename86dc5b8e-c6a8-41dc-926a-e96ac82085b7.exe4 vs rinvoice.exe
                Source: rinvoice.exe, 00000000.00000003.1707753528.00000000039ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rinvoice.exe
                Source: rinvoice.exe, 00000000.00000003.1708003785.0000000003893000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rinvoice.exe
                Source: rinvoice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.RegSvcs.exe.2760326.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.rinvoice.exe.ea0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.3ac3d90.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.29e0ee8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.275f43e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.4f50000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.29e0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.3a76458.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000000.00000002.1710014632.0000000000EA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000001.00000002.2949414991.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080A2D5 GetLastError,FormatMessageW,0_2_0080A2D5
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007F8713 AdjustTokenPrivileges,CloseHandle,0_2_007F8713
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007F8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007F8CC3
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0080B59E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0081F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0081F121
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_008186D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_008186D0
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007A4FE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\rinvoice.exeFile created: C:\Users\user\AppData\Local\Temp\aut183A.tmpJump to behavior
                Source: rinvoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: rinvoice.exeReversingLabs: Detection: 36%
                Source: unknownProcess created: C:\Users\user\Desktop\rinvoice.exe "C:\Users\user\Desktop\rinvoice.exe"
                Source: C:\Users\user\Desktop\rinvoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rinvoice.exe"
                Source: C:\Users\user\Desktop\rinvoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rinvoice.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: rinvoice.exeStatic file information: File size 1174528 > 1048576
                Source: rinvoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: rinvoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: rinvoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: rinvoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: rinvoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: rinvoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: rinvoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: rinvoice.exe, 00000000.00000003.1708759139.0000000003770000.00000004.00001000.00020000.00000000.sdmp, rinvoice.exe, 00000000.00000003.1706970894.00000000038C0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: rinvoice.exe, 00000000.00000003.1708759139.0000000003770000.00000004.00001000.00020000.00000000.sdmp, rinvoice.exe, 00000000.00000003.1706970894.00000000038C0000.00000004.00001000.00020000.00000000.sdmp
                Source: rinvoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: rinvoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: rinvoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: rinvoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: rinvoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation

                barindex
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0081C304 LoadLibraryA,GetProcAddress,0_2_0081C304
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007AC590 push eax; retn 007Ah0_2_007AC599
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00808719 push FFFFFF8Bh; iretd 0_2_0080871B
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CE94F push edi; ret 0_2_007CE951
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CEA68 push esi; ret 0_2_007CEA6A
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C8B85 push ecx; ret 0_2_007C8B98
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CEC43 push esi; ret 0_2_007CEC45
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CED2C push edi; ret 0_2_007CED2E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C40C push cs; iretd 1_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00423149 push eax; ret 1_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C50E push cs; iretd 1_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004231C8 push eax; ret 1_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E21D push ecx; ret 1_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C6BE push ebx; ret 1_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040BB97 push dword ptr [ecx-75h]; iretd 1_2_0040BBA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_025D4F5D push edx; ret 1_2_025D4F63
                Source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'UCKkFcyUKsN1g', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'UCKkFcyUKsN1g', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'UCKkFcyUKsN1g', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'UCKkFcyUKsN1g', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'UCKkFcyUKsN1g', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007A4A35
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_008255FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_008255FD
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007C33C7
                Source: C:\Users\user\Desktop\rinvoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\rinvoice.exeAPI/Special instruction interceptor: Address: DD3234
                Source: RegSvcs.exe, 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6407Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2147Jump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeAPI coverage: 4.7 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00804696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00804696
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0080C9C7
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080C93C FindFirstFileW,FindClose,0_2_0080C93C
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080F200
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080F35D
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0080F65E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00803A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00803A2B
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00803D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00803D4E
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0080BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0080BF27
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007A4AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98840Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98732Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98391Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98282Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98157Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98032Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97093Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96532Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96407Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96282Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96060Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95844Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000001.00000002.2950571059.0000000002AA2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                Source: RegSvcs.exe, 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: vmware
                Source: RegSvcs.exe, 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                Source: RegSvcs.exe, 00000001.00000002.2949629941.0000000000BFC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\rinvoice.exeAPI call chain: ExitProcess graph end nodegraph_0-97466
                Source: C:\Users\user\Desktop\rinvoice.exeAPI call chain: ExitProcess graph end nodegraph_0-97641
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_008141FD BlockInput,0_2_008141FD
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007A3B4C
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_007D5CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_0081C304 LoadLibraryA,GetProcAddress,0_2_0081C304
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00DD34A0 mov eax, dword ptr fs:[00000030h]0_2_00DD34A0
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00DD3500 mov eax, dword ptr fs:[00000030h]0_2_00DD3500
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00DD1E70 mov eax, dword ptr fs:[00000030h]0_2_00DD1E70
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007F81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007F81F7
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CA364 SetUnhandledExceptionFilter,0_2_007CA364
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007CA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007CA395
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004123F1 SetUnhandledExceptionFilter,1_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\rinvoice.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 681008Jump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007F8C93 LogonUserW,0_2_007F8C93
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007A3B4C
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007A4A35
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00804EC9 mouse_event,0_2_00804EC9
                Source: C:\Users\user\Desktop\rinvoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rinvoice.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007F81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007F81F7
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00804C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00804C03
                Source: rinvoice.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: rinvoice.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007C886B cpuid 0_2_007C886B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,1_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_007D50D7
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007E2230 GetUserNameW,0_2_007E2230
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007D418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007D418A
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_007A4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007A4AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950571059.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950571059.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6816, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: rinvoice.exeBinary or memory string: WIN_81
                Source: rinvoice.exeBinary or memory string: WIN_XP
                Source: rinvoice.exeBinary or memory string: WIN_XPe
                Source: rinvoice.exeBinary or memory string: WIN_VISTA
                Source: rinvoice.exeBinary or memory string: WIN_7
                Source: rinvoice.exeBinary or memory string: WIN_8
                Source: rinvoice.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950571059.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6816, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950571059.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950571059.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6816, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.275f43e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3ac3d90.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4f50000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.3a76458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.29e0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2760326.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00816596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00816596
                Source: C:\Users\user\Desktop\rinvoice.exeCode function: 0_2_00816A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00816A5A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                221
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                Software Packing
                NTDS148
                System Information Discovery
                Distributed Component Object Model121
                Input Capture
                2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets561
                Security Software Discovery
                SSH3
                Clipboard Data
                12
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Valid Accounts
                Cached Domain Credentials231
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items231
                Virtualization/Sandbox Evasion
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                rinvoice.exe37%ReversingLabsWin32.Trojan.Strab
                rinvoice.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://r3.o.lencr.org00%URL Reputationsafe
                https://account.dyn.com/0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.i.lencr.org/00%URL Reputationsafe
                http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                http://ip-api.com0%URL Reputationsafe
                http://r3.i.lencr.org/0#0%Avira URL Cloudsafe
                http://mail.uniform.gr0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.uniform.gr
                185.25.23.138
                truetrue
                  unknown
                  ip-api.com
                  208.95.112.1
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://r3.o.lencr.org0RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/RegSvcs.exe, 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2950571059.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.2949629941.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.2949629941.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://mail.uniform.grRegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://r3.i.lencr.org/0#RegSvcs.exe, 00000001.00000002.2952038602.00000000054B2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2949629941.0000000000C46000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ip-api.comRegSvcs.exe, 00000001.00000002.2950571059.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    208.95.112.1
                    ip-api.comUnited States
                    53334TUT-ASUStrue
                    185.25.23.138
                    mail.uniform.grGreece
                    209150POINTERGRtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1465644
                    Start date and time:2024-07-01 22:25:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 31s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:rinvoice.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 95%
                    • Number of executed functions: 58
                    • Number of non-executed functions: 272
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: rinvoice.exe
                    TimeTypeDescription
                    16:26:03API Interceptor43x Sleep call for process: RegSvcs.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    208.95.112.1rQuotation.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • ip-api.com/line/?fields=hosting
                    v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    185.25.23.138rpago.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                        invoice.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          mail.uniform.grrpago.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 185.25.23.138
                          Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                          • 185.25.23.138
                          invoice.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                          • 185.25.23.138
                          ip-api.comrQuotation.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 208.95.112.1
                          v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          TUT-ASUSrQuotation.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 208.95.112.1
                          v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 208.95.112.1
                          POINTERGRrpago.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 185.25.23.138
                          COPIA DE PAGO SWIFT.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.25.23.240
                          DHL_46773482.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.25.23.64
                          Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                          • 185.25.23.138
                          invoice.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                          • 185.25.23.138
                          https://secure.adnxs.com/clktrb?id=704169&redir=//myavenue.gr/.well-known/acme-challenge/01/Get hashmaliciousHTMLPhisherBrowse
                          • 185.25.23.55
                          https://apiservices.krxd.net/click_tracker/track?k4x_event_uid=LR25EaJr&clk=https%3A%2F%2Fcourier-planet.gr%2Fcss%2Fadmine%2F748394%2F%2F%2F%2FZWR3YXJkLmx5b25zQHJlZHdpcmVzcGFjZS5jb20=Get hashmaliciousHTMLPhisherBrowse
                          • 185.25.23.170
                          https://apiservices.krxd.net/click_tracker/track?kx_event_uid=LR25EaJr&clk=https%3A%2F%2Fcourier-planet.gr%2Fcss%2Fadmine%2F748394%2F%2F%2F%2FYWRrYW5lQG1vbnRyb3NlLWVudi5jb20=Get hashmaliciousHTMLPhisherBrowse
                          • 185.25.23.170
                          https://strava.app.link/p87?%243p=e_et&%24original_url=http://sss.b7u.fetronic.gr///.?QQQ#.ZW1jY2xhcnJvbkB3aGl0ZWhvdXNlbGVpc3VyZS5jby51aw===Get hashmaliciousHTMLPhisherBrowse
                          • 185.25.23.170
                          https://strava.app.link/zjq?%243p=e_et&%24original_url=http://ugb.ojs.xvox.gr///.?QQQ#.bWRpc2Fub0BhbGdvbWEuY29t=Get hashmaliciousHTMLPhisherBrowse
                          • 185.25.23.170
                          No context
                          No context
                          Process:C:\Users\user\Desktop\rinvoice.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):268800
                          Entropy (8bit):7.898161375319133
                          Encrypted:false
                          SSDEEP:6144:RsnrImbR/n1YptLLNs4yKUfmWvAJEYz1wLUI:LOnUtNxUONz1wL
                          MD5:37DF1ADD50F4A1B2FAA57858566B4CD5
                          SHA1:C3F80895B5E365A710CE6F4B8AD2F5410DB986FA
                          SHA-256:AA0AF8F17638C5612AC8E5913830D6D258D851BDC57ECBC78DE624357755F847
                          SHA-512:8C4D7EED6878435F4EB372FF641A00DB4DE8BBA91D18E7AC38606B548AE0CE18DD42BB5E668AB25CF55933FC4EE169DC98F6CB62A3FAC5E7E5A0ECC89EF4219E
                          Malicious:false
                          Reputation:low
                          Preview:...W2JTI<A8B..YH.QN9C892.YBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8B.2YHCN.7C.0.f.C..k.!Q2.2+]>:,<nZ"VW]3y 2.8!'.(Vb.}.h >*\m548cYBW1JTIPQ.ouC.6a .GoI.Luz=).;.73..<rC.6a .G.I.Luz,)-;.7.bQ<.C.6.r5GnI.L.0!?.;.78A8BY2YHMQN9C892..'11JTIh.8B.3]H9.NiC892GYBW.JwH3@1BY.XHM/L9C892h.BW1ZTI8.9BY2.HMAN9C:92BYBW1JTI=A8BY2YHM1J9C<92.b@W3JT.8A(BY"YHMQ^9C(92GYBW!JTI8A8BY2YH.DL9.892G9@W..UI8A8BY2YHMQN9C892GYBW1JTI..9BE2YHMQN9C892GYBW1JTI8A8BY2YH.\L9.892GYBW1JTI8.9B.3YHMQN9C892GYBW1JTI8A8BY2YHc%+A7892_.CW1ZTI8.9BY6YHMQN9C892GYBW.JT).3\#-SYH.<N9C.82G7BW1.UI8A8BY2YHMQN9.89ri=##PJTI.q8BY.[HMGN9C2;2GYBW1JTI8A8B.2Y.c#=K 892.CW1*VI8.9BY.[HMQN9C892GYBWqJT.8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YH
                          Process:C:\Users\user\Desktop\rinvoice.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):9858
                          Entropy (8bit):7.6012008140158756
                          Encrypted:false
                          SSDEEP:192:65jwEiqxwzMZTG3c6Vg0X9O1JZUv3QfyYxvonMwqrMWJF24Vm0TXzGh6E1:I6qxwzMZy3QU9ObysvoY5j247Tih6o
                          MD5:6D17233FD7C286F2DE87BF3CB88C7E39
                          SHA1:24121A8985D1124E1F61BCC5207E8F4C554BF7E9
                          SHA-256:8421DD0630215C81A19F744A23CA13609BB75BFAE482AF8DD8920AB875FFCD3F
                          SHA-512:27E4B0F55F4132812E5FB8215C42F3CCA3356B3A6093A6A1B56DB83198A41FDDB7EA8B321702A667E55F9F97173BAFB41F2214663372546D973E06F90F2D9CD5
                          Malicious:false
                          Reputation:low
                          Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                          Process:C:\Users\user\Desktop\rinvoice.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):268800
                          Entropy (8bit):7.898161375319133
                          Encrypted:false
                          SSDEEP:6144:RsnrImbR/n1YptLLNs4yKUfmWvAJEYz1wLUI:LOnUtNxUONz1wL
                          MD5:37DF1ADD50F4A1B2FAA57858566B4CD5
                          SHA1:C3F80895B5E365A710CE6F4B8AD2F5410DB986FA
                          SHA-256:AA0AF8F17638C5612AC8E5913830D6D258D851BDC57ECBC78DE624357755F847
                          SHA-512:8C4D7EED6878435F4EB372FF641A00DB4DE8BBA91D18E7AC38606B548AE0CE18DD42BB5E668AB25CF55933FC4EE169DC98F6CB62A3FAC5E7E5A0ECC89EF4219E
                          Malicious:false
                          Reputation:low
                          Preview:...W2JTI<A8B..YH.QN9C892.YBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8B.2YHCN.7C.0.f.C..k.!Q2.2+]>:,<nZ"VW]3y 2.8!'.(Vb.}.h >*\m548cYBW1JTIPQ.ouC.6a .GoI.Luz=).;.73..<rC.6a .G.I.Luz,)-;.7.bQ<.C.6.r5GnI.L.0!?.;.78A8BY2YHMQN9C892..'11JTIh.8B.3]H9.NiC892GYBW.JwH3@1BY.XHM/L9C892h.BW1ZTI8.9BY2.HMAN9C:92BYBW1JTI=A8BY2YHM1J9C<92.b@W3JT.8A(BY"YHMQ^9C(92GYBW!JTI8A8BY2YH.DL9.892G9@W..UI8A8BY2YHMQN9C892GYBW1JTI..9BE2YHMQN9C892GYBW1JTI8A8BY2YH.\L9.892GYBW1JTI8.9B.3YHMQN9C892GYBW1JTI8A8BY2YHc%+A7892_.CW1ZTI8.9BY6YHMQN9C892GYBW.JT).3\#-SYH.<N9C.82G7BW1.UI8A8BY2YHMQN9.89ri=##PJTI.q8BY.[HMGN9C2;2GYBW1JTI8A8B.2Y.c#=K 892.CW1*VI8.9BY.[HMQN9C892GYBWqJT.8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YHMQN9C892GYBW1JTI8A8BY2YH
                          Process:C:\Users\user\Desktop\rinvoice.exe
                          File Type:ASCII text, with very long lines (28756), with no line terminators
                          Category:dropped
                          Size (bytes):28756
                          Entropy (8bit):3.5928625002975654
                          Encrypted:false
                          SSDEEP:768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbp+IC6bd4vfF3if6gyuh:miTZ+2QoioGRk6ZklputwjpjBkCiw2R9
                          MD5:7A1F1C701B4D50CB3E920308A288C2EA
                          SHA1:4D31AC90D61A75950C10162D80AAD92F269E2346
                          SHA-256:E585E48BB3B808791C06D2F1989EEB7ED2C82887EF06136609D2452EF3EAD4BC
                          SHA-512:D5AEB2052554185038FB613CBF7F409604874ADF3F6F94D579A6C9876F59D18537A5E97798A0A53303599CCA4C15904177EC87E1C5487E513BB96299F4B5E989
                          Malicious:false
                          Reputation:low
                          Preview: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
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.133554625900463
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:rinvoice.exe
                          File size:1'174'528 bytes
                          MD5:70921b4a6f2b97263e1a1f48efe7763b
                          SHA1:dc48ad9c39209bb3e3e94f3b35518f3bba9066eb
                          SHA256:706f1b6ec843638107f441e0b2d266b997e26ca4d1a040d94bf085740ddcf16c
                          SHA512:b7dff05071fee2de30b71e65ec094f5c6cc848bb240611f518f8a757a971d891b35599ff1326a9c12a1618ce8e2e3e76a295365921358fe5fb74244896d30b95
                          SSDEEP:24576:qAHnh+eWsN3skA4RV1Hom2KXMmHayaHz0wFQjImX055:9h+ZkldoPK8YayaHIsOXW
                          TLSH:7045AD1273D6C036FFAB92739B6AB20156BD7D290133852F13982D79BD701B1263E663
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                          Icon Hash:0b1888c999ad811f
                          Entrypoint:0x42800a
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                          Time Stamp:0x6682F71E [Mon Jul 1 18:36:14 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                          Instruction
                          call 00007FA620B84ADDh
                          jmp 00007FA620B77894h
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          push edi
                          push esi
                          mov esi, dword ptr [esp+10h]
                          mov ecx, dword ptr [esp+14h]
                          mov edi, dword ptr [esp+0Ch]
                          mov eax, ecx
                          mov edx, ecx
                          add eax, esi
                          cmp edi, esi
                          jbe 00007FA620B77A1Ah
                          cmp edi, eax
                          jc 00007FA620B77D7Eh
                          bt dword ptr [004C41FCh], 01h
                          jnc 00007FA620B77A19h
                          rep movsb
                          jmp 00007FA620B77D2Ch
                          cmp ecx, 00000080h
                          jc 00007FA620B77BE4h
                          mov eax, edi
                          xor eax, esi
                          test eax, 0000000Fh
                          jne 00007FA620B77A20h
                          bt dword ptr [004BF324h], 01h
                          jc 00007FA620B77EF0h
                          bt dword ptr [004C41FCh], 00000000h
                          jnc 00007FA620B77BBDh
                          test edi, 00000003h
                          jne 00007FA620B77BCEh
                          test esi, 00000003h
                          jne 00007FA620B77BADh
                          bt edi, 02h
                          jnc 00007FA620B77A1Fh
                          mov eax, dword ptr [esi]
                          sub ecx, 04h
                          lea esi, dword ptr [esi+04h]
                          mov dword ptr [edi], eax
                          lea edi, dword ptr [edi+04h]
                          bt edi, 03h
                          jnc 00007FA620B77A23h
                          movq xmm1, qword ptr [esi]
                          sub ecx, 08h
                          lea esi, dword ptr [esi+08h]
                          movq qword ptr [edi], xmm1
                          lea edi, dword ptr [edi+08h]
                          test esi, 00000007h
                          je 00007FA620B77A75h
                          bt esi, 03h
                          Programming Language:
                          • [ASM] VS2013 build 21005
                          • [ C ] VS2013 build 21005
                          • [C++] VS2013 build 21005
                          • [ C ] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          • [ASM] VS2013 UPD5 build 40629
                          • [RES] VS2013 build 21005
                          • [LNK] VS2013 UPD5 build 40629
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x544b0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x11d0000x7134.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0xc80000x544b00x546004422584f9381d10004d0c43f40df3b32False0.9402922453703704data7.9030775008794105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x11d0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xc84580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                          RT_ICON0xc85800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                          RT_ICON0xc86a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                          RT_ICON0xc87d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 60472 x 60472 px/mEnglishGreat Britain0.2639348134152102
                          RT_MENU0xcc9f80x50dataEnglishGreat Britain0.9
                          RT_STRING0xcca480x594dataEnglishGreat Britain0.3333333333333333
                          RT_STRING0xccfdc0x68adataEnglishGreat Britain0.2747909199522103
                          RT_STRING0xcd6680x490dataEnglishGreat Britain0.3715753424657534
                          RT_STRING0xcdaf80x5fcdataEnglishGreat Britain0.3087467362924282
                          RT_STRING0xce0f40x65cdataEnglishGreat Britain0.34336609336609336
                          RT_STRING0xce7500x466dataEnglishGreat Britain0.3605683836589698
                          RT_STRING0xcebb80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                          RT_RCDATA0xced100x4d282data1.000335406949885
                          RT_GROUP_ICON0x11bf940x14dataEnglishGreat Britain1.25
                          RT_GROUP_ICON0x11bfa80x14dataEnglishGreat Britain1.25
                          RT_GROUP_ICON0x11bfbc0x14dataEnglishGreat Britain1.15
                          RT_GROUP_ICON0x11bfd00x14dataEnglishGreat Britain1.25
                          RT_VERSION0x11bfe40xdcdataEnglishGreat Britain0.6181818181818182
                          RT_MANIFEST0x11c0c00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                          DLLImport
                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                          PSAPI.DLLGetProcessMemoryInfo
                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                          UxTheme.dllIsThemeActive
                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                          Language of compilation systemCountry where language is spokenMap
                          EnglishGreat Britain
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 1, 2024 22:26:03.013396025 CEST4973080192.168.2.4208.95.112.1
                          Jul 1, 2024 22:26:03.018404007 CEST8049730208.95.112.1192.168.2.4
                          Jul 1, 2024 22:26:03.018476009 CEST4973080192.168.2.4208.95.112.1
                          Jul 1, 2024 22:26:03.021302938 CEST4973080192.168.2.4208.95.112.1
                          Jul 1, 2024 22:26:03.026113987 CEST8049730208.95.112.1192.168.2.4
                          Jul 1, 2024 22:26:03.552005053 CEST8049730208.95.112.1192.168.2.4
                          Jul 1, 2024 22:26:03.607673883 CEST4973080192.168.2.4208.95.112.1
                          Jul 1, 2024 22:26:04.248112917 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:04.252934933 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:04.256370068 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:06.247206926 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.247695923 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:06.252554893 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.465871096 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.466079950 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:06.470944881 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.684878111 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.695768118 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:06.700690985 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.922210932 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.922290087 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.922301054 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.922312975 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:06.922348022 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:06.922379017 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:06.949022055 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:06.953788996 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.167361975 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.179995060 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:07.184992075 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.398296118 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.399540901 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:07.404429913 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.617899895 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.618217945 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:07.623064041 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.839169979 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:07.839452028 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:07.844309092 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.249623060 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.249962091 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:08.262049913 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.479645967 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.479932070 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:08.484808922 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.698266983 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.698785067 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:08.698951960 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:08.698951960 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:08.698951960 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:08.703599930 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.703680992 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.704164982 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:08.704173088 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:09.045188904 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:26:09.092175961 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:26:54.092329025 CEST4973080192.168.2.4208.95.112.1
                          Jul 1, 2024 22:26:54.097824097 CEST8049730208.95.112.1192.168.2.4
                          Jul 1, 2024 22:26:54.097898006 CEST4973080192.168.2.4208.95.112.1
                          Jul 1, 2024 22:27:44.108371973 CEST49731587192.168.2.4185.25.23.138
                          Jul 1, 2024 22:27:44.113681078 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:27:44.327373981 CEST58749731185.25.23.138192.168.2.4
                          Jul 1, 2024 22:27:44.332678080 CEST49731587192.168.2.4185.25.23.138
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 1, 2024 22:26:02.998678923 CEST5182253192.168.2.41.1.1.1
                          Jul 1, 2024 22:26:03.006021976 CEST53518221.1.1.1192.168.2.4
                          Jul 1, 2024 22:26:04.090718031 CEST6168353192.168.2.41.1.1.1
                          Jul 1, 2024 22:26:04.247195959 CEST53616831.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 1, 2024 22:26:02.998678923 CEST192.168.2.41.1.1.10xa2fbStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                          Jul 1, 2024 22:26:04.090718031 CEST192.168.2.41.1.1.10xd5f1Standard query (0)mail.uniform.grA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 1, 2024 22:26:03.006021976 CEST1.1.1.1192.168.2.40xa2fbNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                          Jul 1, 2024 22:26:04.247195959 CEST1.1.1.1192.168.2.40xd5f1No error (0)mail.uniform.gr185.25.23.138A (IP address)IN (0x0001)false
                          • ip-api.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.449730208.95.112.1806816C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                          TimestampBytes transferredDirectionData
                          Jul 1, 2024 22:26:03.021302938 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                          Host: ip-api.com
                          Connection: Keep-Alive
                          Jul 1, 2024 22:26:03.552005053 CEST175INHTTP/1.1 200 OK
                          Date: Mon, 01 Jul 2024 20:26:02 GMT
                          Content-Type: text/plain; charset=utf-8
                          Content-Length: 6
                          Access-Control-Allow-Origin: *
                          X-Ttl: 60
                          X-Rl: 44
                          Data Raw: 66 61 6c 73 65 0a
                          Data Ascii: false


                          TimestampSource PortDest PortSource IPDest IPCommands
                          Jul 1, 2024 22:26:06.247206926 CEST58749731185.25.23.138192.168.2.4220-linux42.name-servers.gr ESMTP Exim 4.97.1 #2 Mon, 01 Jul 2024 23:26:06 +0300
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 1, 2024 22:26:06.247695923 CEST49731587192.168.2.4185.25.23.138EHLO 849224
                          Jul 1, 2024 22:26:06.465871096 CEST58749731185.25.23.138192.168.2.4250-linux42.name-servers.gr Hello 849224 [8.46.123.33]
                          250-SIZE 52428800
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-STARTTLS
                          250 HELP
                          Jul 1, 2024 22:26:06.466079950 CEST49731587192.168.2.4185.25.23.138STARTTLS
                          Jul 1, 2024 22:26:06.684878111 CEST58749731185.25.23.138192.168.2.4220 TLS go ahead

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:16:26:00
                          Start date:01/07/2024
                          Path:C:\Users\user\Desktop\rinvoice.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\rinvoice.exe"
                          Imagebase:0x7a0000
                          File size:1'174'528 bytes
                          MD5 hash:70921B4A6F2B97263E1A1F48EFE7763B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1710014632.0000000000EA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:16:26:01
                          Start date:01/07/2024
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\rinvoice.exe"
                          Imagebase:0x550000
                          File size:45'984 bytes
                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2951486882.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2950188294.000000000271F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2950571059.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2950571059.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000001.00000002.2949414991.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.2950497744.00000000029E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.2951732022.0000000004F50000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2950571059.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2950571059.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:4.1%
                            Dynamic/Decrypted Code Coverage:0.4%
                            Signature Coverage:4.5%
                            Total number of Nodes:2000
                            Total number of Limit Nodes:42
                            execution_graph 97415 7a568a 97422 7a5c18 97415->97422 97421 7a56ba Mailbox 97434 7c0ff6 97422->97434 97424 7a5c2b 97425 7c0ff6 Mailbox 59 API calls 97424->97425 97426 7a569c 97425->97426 97427 7a5632 97426->97427 97472 7a5a2f 97427->97472 97429 7a5643 97431 7a5674 97429->97431 97479 7a5d20 97429->97479 97485 7a5bda 59 API calls 2 library calls 97429->97485 97431->97421 97433 7a81c1 61 API calls Mailbox 97431->97433 97433->97421 97436 7c0ffe 97434->97436 97437 7c1018 97436->97437 97439 7c101c std::exception::exception 97436->97439 97444 7c594c 97436->97444 97461 7c35e1 DecodePointer 97436->97461 97437->97424 97462 7c87db RaiseException 97439->97462 97441 7c1046 97463 7c8711 58 API calls _free 97441->97463 97443 7c1058 97443->97424 97445 7c59c7 97444->97445 97450 7c5958 97444->97450 97470 7c35e1 DecodePointer 97445->97470 97447 7c59cd 97471 7c8d68 58 API calls __getptd_noexit 97447->97471 97448 7c5963 97448->97450 97464 7ca3ab 58 API calls 2 library calls 97448->97464 97465 7ca408 58 API calls 8 library calls 97448->97465 97466 7c32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97448->97466 97450->97448 97452 7c598b RtlAllocateHeap 97450->97452 97455 7c59b3 97450->97455 97459 7c59b1 97450->97459 97467 7c35e1 DecodePointer 97450->97467 97452->97450 97453 7c59bf 97452->97453 97453->97436 97468 7c8d68 58 API calls __getptd_noexit 97455->97468 97469 7c8d68 58 API calls __getptd_noexit 97459->97469 97461->97436 97462->97441 97463->97443 97464->97448 97465->97448 97467->97450 97468->97459 97469->97453 97470->97447 97471->97453 97473 7de065 97472->97473 97474 7a5a40 97472->97474 97486 7f6443 59 API calls Mailbox 97473->97486 97474->97429 97476 7de06f 97477 7c0ff6 Mailbox 59 API calls 97476->97477 97478 7de07b 97477->97478 97480 7a5d93 97479->97480 97484 7a5d2e 97479->97484 97487 7a5dae SetFilePointerEx 97480->97487 97482 7a5d56 97482->97429 97483 7a5d66 ReadFile 97483->97482 97483->97484 97484->97482 97484->97483 97485->97429 97486->97476 97487->97484 97488 7ae70b 97491 7ad260 97488->97491 97490 7ae719 97492 7ad27d 97491->97492 97520 7ad4dd 97491->97520 97493 7e2b0a 97492->97493 97494 7e2abb 97492->97494 97523 7ad2a4 97492->97523 97565 81a6fb 341 API calls __cinit 97493->97565 97497 7e2abe 97494->97497 97502 7e2ad9 97494->97502 97498 7e2aca 97497->97498 97497->97523 97563 81ad0f 341 API calls 97498->97563 97502->97520 97564 81b1b7 341 API calls 3 library calls 97502->97564 97503 7ad594 97554 7a8bb2 68 API calls 97503->97554 97504 7e2cdf 97504->97504 97505 7ad6ab 97505->97490 97509 7ad5a3 97509->97490 97510 7e2c26 97573 81aa66 89 API calls 97510->97573 97520->97505 97574 80a0b5 89 API calls 4 library calls 97520->97574 97523->97503 97523->97505 97523->97510 97523->97520 97525 7aa000 97523->97525 97548 7a88a0 68 API calls __cinit 97523->97548 97549 7a86a2 68 API calls 97523->97549 97550 7a8620 97523->97550 97555 7a859a 68 API calls 97523->97555 97556 7ad0dc 341 API calls 97523->97556 97557 7a9f3a 59 API calls Mailbox 97523->97557 97558 7c2f80 97523->97558 97561 7ad060 89 API calls 97523->97561 97562 7acedd 341 API calls 97523->97562 97566 7a8bb2 68 API calls 97523->97566 97567 7a9e9c 60 API calls Mailbox 97523->97567 97568 7f6d03 60 API calls 97523->97568 97569 7a81a7 97523->97569 97526 7aa01f 97525->97526 97543 7aa04d Mailbox 97525->97543 97527 7c0ff6 Mailbox 59 API calls 97526->97527 97527->97543 97528 7c2f80 67 API calls __cinit 97528->97543 97529 7ab5d5 97530 7a81a7 59 API calls 97529->97530 97542 7aa1b7 97530->97542 97531 7c0ff6 59 API calls Mailbox 97531->97543 97532 7a77c7 59 API calls 97532->97543 97536 7e047f 97577 80a0b5 89 API calls 4 library calls 97536->97577 97538 7a81a7 59 API calls 97538->97543 97540 7f7405 59 API calls 97540->97543 97541 7e048e 97541->97523 97542->97523 97543->97528 97543->97529 97543->97531 97543->97532 97543->97536 97543->97538 97543->97540 97543->97542 97544 7e0e00 97543->97544 97546 7ab5da 97543->97546 97547 7aa6ba 97543->97547 97575 7aca20 341 API calls 2 library calls 97543->97575 97576 7aba60 60 API calls Mailbox 97543->97576 97579 80a0b5 89 API calls 4 library calls 97544->97579 97580 80a0b5 89 API calls 4 library calls 97546->97580 97578 80a0b5 89 API calls 4 library calls 97547->97578 97548->97523 97549->97523 97551 7a862b 97550->97551 97553 7a8652 97551->97553 97581 7a8b13 69 API calls Mailbox 97551->97581 97553->97523 97554->97509 97555->97523 97556->97523 97557->97523 97582 7c2e84 97558->97582 97560 7c2f8b 97560->97523 97561->97523 97562->97523 97563->97505 97564->97520 97565->97523 97566->97523 97567->97523 97568->97523 97570 7a81ba 97569->97570 97571 7a81b2 97569->97571 97570->97523 97660 7a80d7 59 API calls 2 library calls 97571->97660 97573->97520 97574->97504 97575->97543 97576->97543 97577->97541 97578->97542 97579->97546 97580->97542 97581->97553 97583 7c2e90 __lseeki64 97582->97583 97590 7c3457 97583->97590 97589 7c2eb7 __lseeki64 97589->97560 97607 7c9e4b 97590->97607 97592 7c2e99 97593 7c2ec8 DecodePointer DecodePointer 97592->97593 97594 7c2ef5 97593->97594 97595 7c2ea5 97593->97595 97594->97595 97653 7c89e4 59 API calls wcstoxl 97594->97653 97604 7c2ec2 97595->97604 97597 7c2f58 EncodePointer EncodePointer 97597->97595 97598 7c2f07 97598->97597 97599 7c2f2c 97598->97599 97654 7c8aa4 61 API calls 2 library calls 97598->97654 97599->97595 97603 7c2f46 EncodePointer 97599->97603 97655 7c8aa4 61 API calls 2 library calls 97599->97655 97602 7c2f40 97602->97595 97602->97603 97603->97597 97656 7c3460 97604->97656 97608 7c9e5c 97607->97608 97609 7c9e6f EnterCriticalSection 97607->97609 97614 7c9ed3 97608->97614 97609->97592 97611 7c9e62 97611->97609 97638 7c32f5 58 API calls 3 library calls 97611->97638 97615 7c9edf __lseeki64 97614->97615 97616 7c9ee8 97615->97616 97617 7c9f00 97615->97617 97639 7ca3ab 58 API calls 2 library calls 97616->97639 97625 7c9f21 __lseeki64 97617->97625 97642 7c8a5d 58 API calls 2 library calls 97617->97642 97619 7c9eed 97640 7ca408 58 API calls 8 library calls 97619->97640 97622 7c9f15 97623 7c9f1c 97622->97623 97624 7c9f2b 97622->97624 97643 7c8d68 58 API calls __getptd_noexit 97623->97643 97628 7c9e4b __lock 58 API calls 97624->97628 97625->97611 97626 7c9ef4 97641 7c32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97626->97641 97630 7c9f32 97628->97630 97632 7c9f3f 97630->97632 97633 7c9f57 97630->97633 97644 7ca06b InitializeCriticalSectionAndSpinCount 97632->97644 97645 7c2f95 97633->97645 97636 7c9f4b 97651 7c9f73 LeaveCriticalSection _doexit 97636->97651 97639->97619 97640->97626 97642->97622 97643->97625 97644->97636 97646 7c2f9e RtlFreeHeap 97645->97646 97647 7c2fc7 __dosmaperr 97645->97647 97646->97647 97648 7c2fb3 97646->97648 97647->97636 97652 7c8d68 58 API calls __getptd_noexit 97648->97652 97650 7c2fb9 GetLastError 97650->97647 97651->97625 97652->97650 97653->97598 97654->97599 97655->97602 97659 7c9fb5 LeaveCriticalSection 97656->97659 97658 7c2ec7 97658->97589 97659->97658 97660->97570 97661 7a107d 97666 7a71eb 97661->97666 97663 7a108c 97664 7c2f80 __cinit 67 API calls 97663->97664 97665 7a1096 97664->97665 97667 7a71fb __write_nolock 97666->97667 97697 7a77c7 97667->97697 97671 7a72ba 97709 7c074f 97671->97709 97678 7a77c7 59 API calls 97679 7a72eb 97678->97679 97728 7a7eec 97679->97728 97681 7a72f4 RegOpenKeyExW 97682 7decda RegQueryValueExW 97681->97682 97686 7a7316 Mailbox 97681->97686 97683 7ded6c RegCloseKey 97682->97683 97684 7decf7 97682->97684 97683->97686 97696 7ded7e _wcscat Mailbox __wsetenvp 97683->97696 97685 7c0ff6 Mailbox 59 API calls 97684->97685 97687 7ded10 97685->97687 97686->97663 97732 7a538e 97687->97732 97688 7a7b52 59 API calls 97688->97696 97691 7ded38 97735 7a7d2c 97691->97735 97693 7ded52 97693->97683 97695 7a3f84 59 API calls 97695->97696 97696->97686 97696->97688 97696->97695 97744 7a7f41 97696->97744 97698 7c0ff6 Mailbox 59 API calls 97697->97698 97699 7a77e8 97698->97699 97700 7c0ff6 Mailbox 59 API calls 97699->97700 97701 7a72b1 97700->97701 97702 7a4864 97701->97702 97748 7d1b90 97702->97748 97705 7a7f41 59 API calls 97706 7a4897 97705->97706 97750 7a48ae 97706->97750 97708 7a48a1 Mailbox 97708->97671 97710 7d1b90 __write_nolock 97709->97710 97711 7c075c GetFullPathNameW 97710->97711 97712 7c077e 97711->97712 97713 7a7d2c 59 API calls 97712->97713 97714 7a72c5 97713->97714 97715 7a7e0b 97714->97715 97716 7a7e1f 97715->97716 97717 7df173 97715->97717 97772 7a7db0 97716->97772 97777 7a8189 97717->97777 97720 7a72d3 97722 7a3f84 97720->97722 97721 7df17e __wsetenvp _memmove 97723 7a3f92 97722->97723 97727 7a3fb4 _memmove 97722->97727 97725 7c0ff6 Mailbox 59 API calls 97723->97725 97724 7c0ff6 Mailbox 59 API calls 97726 7a3fc8 97724->97726 97725->97727 97726->97678 97727->97724 97729 7a7f06 97728->97729 97731 7a7ef9 97728->97731 97730 7c0ff6 Mailbox 59 API calls 97729->97730 97730->97731 97731->97681 97733 7c0ff6 Mailbox 59 API calls 97732->97733 97734 7a53a0 RegQueryValueExW 97733->97734 97734->97691 97734->97693 97736 7a7d38 __wsetenvp 97735->97736 97737 7a7da5 97735->97737 97739 7a7d4e 97736->97739 97740 7a7d73 97736->97740 97738 7a7e8c 59 API calls 97737->97738 97743 7a7d56 _memmove 97738->97743 97780 7a8087 97739->97780 97741 7a8189 59 API calls 97740->97741 97741->97743 97743->97693 97745 7a7f50 __wsetenvp _memmove 97744->97745 97746 7c0ff6 Mailbox 59 API calls 97745->97746 97747 7a7f8e 97746->97747 97747->97696 97749 7a4871 GetModuleFileNameW 97748->97749 97749->97705 97751 7d1b90 __write_nolock 97750->97751 97752 7a48bb GetFullPathNameW 97751->97752 97753 7a48da 97752->97753 97754 7a48f7 97752->97754 97755 7a7d2c 59 API calls 97753->97755 97756 7a7eec 59 API calls 97754->97756 97757 7a48e6 97755->97757 97756->97757 97760 7a7886 97757->97760 97761 7a7894 97760->97761 97764 7a7e8c 97761->97764 97763 7a48f2 97763->97708 97765 7a7e9a 97764->97765 97766 7a7ea3 _memmove 97764->97766 97765->97766 97768 7a7faf 97765->97768 97766->97763 97769 7a7fc2 97768->97769 97771 7a7fbf _memmove 97768->97771 97770 7c0ff6 Mailbox 59 API calls 97769->97770 97770->97771 97771->97766 97773 7a7dbf __wsetenvp 97772->97773 97774 7a8189 59 API calls 97773->97774 97775 7a7dd0 _memmove 97773->97775 97776 7df130 _memmove 97774->97776 97775->97720 97778 7c0ff6 Mailbox 59 API calls 97777->97778 97779 7a8193 97778->97779 97779->97721 97781 7a809f 97780->97781 97783 7a8099 97780->97783 97782 7c0ff6 Mailbox 59 API calls 97781->97782 97782->97783 97783->97743 97784 7e0226 97790 7aade2 Mailbox 97784->97790 97786 7e0c86 97954 7f66f4 97786->97954 97788 7e0c8f 97790->97786 97790->97788 97791 7e00e0 VariantClear 97790->97791 97792 7ab6c1 97790->97792 97800 80d2e6 97790->97800 97847 7b2123 97790->97847 97887 81e237 97790->97887 97890 80d2e5 97790->97890 97937 81474d 97790->97937 97946 82251d 97790->97946 97951 7a9df0 59 API calls Mailbox 97790->97951 97952 7f7405 59 API calls 97790->97952 97791->97790 97953 80a0b5 89 API calls 4 library calls 97792->97953 97801 80d305 97800->97801 97802 80d310 97800->97802 97988 7a9c9c 59 API calls 97801->97988 97805 7a77c7 59 API calls 97802->97805 97844 80d3ea Mailbox 97802->97844 97804 7c0ff6 Mailbox 59 API calls 97806 80d433 97804->97806 97807 80d334 97805->97807 97808 80d43f 97806->97808 98054 7a5906 60 API calls Mailbox 97806->98054 97809 7a77c7 59 API calls 97807->97809 97957 7a9997 97808->97957 97811 80d33d 97809->97811 97813 7a9997 84 API calls 97811->97813 97815 80d349 97813->97815 97989 7a46f9 97815->97989 97819 80d35e 98040 7a7c8e 97819->98040 97820 80d46a GetLastError 97823 80d483 97820->97823 97821 80d49e 97824 80d500 97821->97824 97825 80d4c9 97821->97825 97843 80d3f3 Mailbox 97823->97843 98055 7a5a1a CloseHandle 97823->98055 97827 7c0ff6 Mailbox 59 API calls 97824->97827 97828 7c0ff6 Mailbox 59 API calls 97825->97828 97831 80d505 97827->97831 97833 80d4ce 97828->97833 97829 80d3e3 98053 7a9c9c 59 API calls 97829->98053 97837 7a77c7 59 API calls 97831->97837 97831->97843 97835 80d4df 97833->97835 97838 7a77c7 59 API calls 97833->97838 98056 80f835 59 API calls 2 library calls 97835->98056 97837->97843 97838->97835 97839 80d3a5 97841 7a7f41 59 API calls 97839->97841 97842 80d3b2 97841->97842 98052 803c66 63 API calls Mailbox 97842->98052 97843->97790 97844->97804 97844->97843 97846 80d3bb Mailbox 97846->97829 98133 7a9bf8 97847->98133 97851 7c0ff6 Mailbox 59 API calls 97852 7b2154 97851->97852 97854 7b2164 97852->97854 98161 7a5906 60 API calls Mailbox 97852->98161 97853 7e69af 97864 7b2189 97853->97864 98165 80f7df 59 API calls 97853->98165 97856 7a9997 84 API calls 97854->97856 97857 7b2172 97856->97857 97859 7a5956 67 API calls 97857->97859 97861 7b2181 97859->97861 97860 7e69f7 97862 7e69ff 97860->97862 97863 7b2196 97860->97863 97861->97853 97861->97864 98164 7a5a1a CloseHandle 97861->98164 98167 7a9c9c 59 API calls 97862->98167 97865 7a5e3f 2 API calls 97863->97865 97864->97863 98166 7a9c9c 59 API calls 97864->98166 97868 7b219d 97865->97868 97869 7b21b7 97868->97869 97870 7e6a11 97868->97870 97872 7a77c7 59 API calls 97869->97872 97871 7c0ff6 Mailbox 59 API calls 97870->97871 97873 7e6a17 97871->97873 97874 7b21bf 97872->97874 97875 7e6a2b 97873->97875 98168 7a59b0 ReadFile SetFilePointerEx 97873->98168 98146 7a56d2 97874->98146 97881 7e6a2f _memmove 97875->97881 98169 80794e 59 API calls 2 library calls 97875->98169 97877 7b21ce 97877->97881 98162 7a9b9c 59 API calls Mailbox 97877->98162 97882 7b21e2 Mailbox 97883 7b221c 97882->97883 97884 7a5dcf CloseHandle 97882->97884 97883->97790 97885 7b2210 97884->97885 97885->97883 98163 7a5a1a CloseHandle 97885->98163 98173 81cdf1 97887->98173 97889 81e247 97889->97790 97891 80d305 97890->97891 97892 80d310 97890->97892 98284 7a9c9c 59 API calls 97891->98284 97895 7a77c7 59 API calls 97892->97895 97935 80d3ea Mailbox 97892->97935 97894 7c0ff6 Mailbox 59 API calls 97896 80d433 97894->97896 97897 80d334 97895->97897 97898 80d43f 97896->97898 98287 7a5906 60 API calls Mailbox 97896->98287 97899 7a77c7 59 API calls 97897->97899 97902 7a9997 84 API calls 97898->97902 97901 80d33d 97899->97901 97903 7a9997 84 API calls 97901->97903 97904 80d457 97902->97904 97905 80d349 97903->97905 97906 7a5956 67 API calls 97904->97906 97907 7a46f9 59 API calls 97905->97907 97908 80d466 97906->97908 97909 80d35e 97907->97909 97910 80d46a GetLastError 97908->97910 97911 80d49e 97908->97911 97912 7a7c8e 59 API calls 97909->97912 97913 80d483 97910->97913 97914 80d500 97911->97914 97915 80d4c9 97911->97915 97916 80d391 97912->97916 97920 80d3f3 Mailbox 97913->97920 98288 7a5a1a CloseHandle 97913->98288 97917 7c0ff6 Mailbox 59 API calls 97914->97917 97918 7c0ff6 Mailbox 59 API calls 97915->97918 97919 80d3e3 97916->97919 97924 803e73 3 API calls 97916->97924 97922 80d505 97917->97922 97925 80d4ce 97918->97925 98286 7a9c9c 59 API calls 97919->98286 97920->97790 97922->97920 97928 7a77c7 59 API calls 97922->97928 97927 80d3a1 97924->97927 97926 80d4df 97925->97926 97929 7a77c7 59 API calls 97925->97929 98289 80f835 59 API calls 2 library calls 97926->98289 97927->97919 97930 80d3a5 97927->97930 97928->97920 97929->97926 97932 7a7f41 59 API calls 97930->97932 97933 80d3b2 97932->97933 98285 803c66 63 API calls Mailbox 97933->98285 97935->97894 97935->97920 97936 80d3bb Mailbox 97936->97919 97938 7a9997 84 API calls 97937->97938 97939 814787 97938->97939 98290 7a63a0 97939->98290 97941 814797 97942 8147bc 97941->97942 97943 7aa000 341 API calls 97941->97943 97944 7a9bf8 59 API calls 97942->97944 97945 8147c0 97942->97945 97943->97942 97944->97945 97945->97790 98335 7ff8f2 97946->98335 97948 822529 98354 7a9b9c 59 API calls Mailbox 97948->98354 97950 822545 Mailbox 97950->97790 97951->97790 97952->97790 97953->97786 98356 7f6636 97954->98356 97956 7f6702 97956->97788 97958 7a99ab 97957->97958 97959 7a99b1 97957->97959 97975 7a5956 97958->97975 97960 7df9fc __i64tow 97959->97960 97961 7a99f9 97959->97961 97962 7a99b7 __itow 97959->97962 97966 7df903 97959->97966 98057 7c38d8 83 API calls 3 library calls 97961->98057 97964 7c0ff6 Mailbox 59 API calls 97962->97964 97967 7a99d1 97964->97967 97968 7c0ff6 Mailbox 59 API calls 97966->97968 97970 7df97b Mailbox _wcscpy 97966->97970 97967->97958 97969 7a7f41 59 API calls 97967->97969 97971 7df948 97968->97971 97969->97958 98058 7c38d8 83 API calls 3 library calls 97970->98058 97972 7c0ff6 Mailbox 59 API calls 97971->97972 97973 7df96e 97972->97973 97973->97970 97974 7a7f41 59 API calls 97973->97974 97974->97970 98059 7a5dcf 97975->98059 97979 7a59a4 97979->97820 97979->97821 97980 7a5981 97980->97979 98071 7a5770 97980->98071 97982 7a5993 98088 7a53db SetFilePointerEx SetFilePointerEx 97982->98088 97984 7a599a 97984->97979 97985 7de030 97984->97985 98089 803696 SetFilePointerEx SetFilePointerEx WriteFile 97985->98089 97987 7de060 97987->97979 97988->97802 97990 7a77c7 59 API calls 97989->97990 97991 7a470f 97990->97991 97992 7a77c7 59 API calls 97991->97992 97993 7a4717 97992->97993 97994 7a77c7 59 API calls 97993->97994 97995 7a471f 97994->97995 97996 7a77c7 59 API calls 97995->97996 97997 7a4727 97996->97997 97998 7a475b 97997->97998 97999 7dd8fb 97997->97999 98000 7a79ab 59 API calls 97998->98000 98001 7a81a7 59 API calls 97999->98001 98002 7a4769 98000->98002 98003 7dd904 98001->98003 98004 7a7e8c 59 API calls 98002->98004 98005 7a7eec 59 API calls 98003->98005 98006 7a4773 98004->98006 98009 7a479e 98005->98009 98008 7a79ab 59 API calls 98006->98008 98006->98009 98007 7a47de 98105 7a79ab 98007->98105 98011 7a4794 98008->98011 98009->98007 98012 7a47bd 98009->98012 98021 7dd924 98009->98021 98015 7a7e8c 59 API calls 98011->98015 98118 7a7b52 98012->98118 98014 7a47ef 98019 7a4801 98014->98019 98022 7a81a7 59 API calls 98014->98022 98015->98009 98016 7dd9f4 98017 7a7d2c 59 API calls 98016->98017 98039 7dd9b1 98017->98039 98020 7a4811 98019->98020 98023 7a81a7 59 API calls 98019->98023 98024 7a4818 98020->98024 98026 7a81a7 59 API calls 98020->98026 98021->98016 98028 7dd9dd 98021->98028 98036 7dd95b 98021->98036 98022->98019 98023->98020 98027 7a81a7 59 API calls 98024->98027 98035 7a481f Mailbox 98024->98035 98025 7a79ab 59 API calls 98025->98007 98026->98024 98027->98035 98028->98016 98029 7dd9c8 98028->98029 98032 7a7d2c 59 API calls 98029->98032 98030 7dd9b9 98031 7a7d2c 59 API calls 98030->98031 98031->98039 98032->98039 98033 7a7b52 59 API calls 98033->98039 98035->97819 98036->98030 98037 7dd9a4 98036->98037 98038 7a7d2c 59 API calls 98037->98038 98038->98039 98039->98007 98039->98033 98121 7a7a84 59 API calls 2 library calls 98039->98121 98041 7df094 98040->98041 98042 7a7ca0 98040->98042 98128 7f8123 59 API calls _memmove 98041->98128 98122 7a7bb1 98042->98122 98045 7a7cac 98045->97829 98049 803e73 98045->98049 98046 7df09e 98047 7a81a7 59 API calls 98046->98047 98048 7df0a6 Mailbox 98047->98048 98129 804696 GetFileAttributesW 98049->98129 98052->97846 98053->97844 98054->97808 98055->97843 98056->97843 98057->97962 98058->97960 98060 7a5de8 98059->98060 98061 7a5962 98059->98061 98060->98061 98062 7a5ded CloseHandle 98060->98062 98063 7a5df9 98061->98063 98062->98061 98064 7a5e12 CreateFileW 98063->98064 98065 7de181 98063->98065 98066 7a5e34 98064->98066 98065->98066 98067 7de187 CreateFileW 98065->98067 98066->97980 98067->98066 98068 7de1ad 98067->98068 98090 7a5c4e 98068->98090 98072 7a578b 98071->98072 98073 7ddfce 98071->98073 98074 7a5c4e 2 API calls 98072->98074 98083 7a581a 98072->98083 98073->98083 98100 7a5e3f 98073->98100 98075 7a57ad 98074->98075 98076 7a538e 59 API calls 98075->98076 98078 7a57b7 98076->98078 98078->98073 98079 7a57c4 98078->98079 98080 7c0ff6 Mailbox 59 API calls 98079->98080 98081 7a57cf 98080->98081 98082 7a538e 59 API calls 98081->98082 98084 7a57da 98082->98084 98083->97982 98085 7a5d20 2 API calls 98084->98085 98086 7a5807 98085->98086 98087 7a5c4e 2 API calls 98086->98087 98087->98083 98088->97984 98089->97987 98097 7a5c68 98090->98097 98091 7a5cef SetFilePointerEx 98098 7a5dae SetFilePointerEx 98091->98098 98092 7de151 98099 7a5dae SetFilePointerEx 98092->98099 98095 7a5cc3 98095->98066 98096 7de16b 98097->98091 98097->98092 98097->98095 98098->98095 98099->98096 98101 7a5c4e 2 API calls 98100->98101 98102 7a5e60 98101->98102 98103 7a5c4e 2 API calls 98102->98103 98104 7a5e74 98103->98104 98104->98083 98106 7a79ba 98105->98106 98107 7a7a17 98105->98107 98106->98107 98109 7a79c5 98106->98109 98108 7a7e8c 59 API calls 98107->98108 98115 7a79e8 _memmove 98108->98115 98110 7a79e0 98109->98110 98111 7def32 98109->98111 98113 7a8087 59 API calls 98110->98113 98112 7a8189 59 API calls 98111->98112 98114 7def3c 98112->98114 98113->98115 98116 7c0ff6 Mailbox 59 API calls 98114->98116 98115->98014 98117 7def5c 98116->98117 98119 7a7faf 59 API calls 98118->98119 98120 7a47c7 98119->98120 98120->98007 98120->98025 98121->98039 98123 7a7bbf 98122->98123 98127 7a7be5 _memmove 98122->98127 98124 7c0ff6 Mailbox 59 API calls 98123->98124 98123->98127 98125 7a7c34 98124->98125 98126 7c0ff6 Mailbox 59 API calls 98125->98126 98126->98127 98127->98045 98128->98046 98130 8046b1 FindFirstFileW 98129->98130 98131 803e7a 98129->98131 98130->98131 98132 8046c6 FindClose 98130->98132 98131->97829 98131->97839 98132->98131 98134 7dfbff 98133->98134 98135 7a9c08 98133->98135 98136 7dfc10 98134->98136 98137 7a7d2c 59 API calls 98134->98137 98140 7c0ff6 Mailbox 59 API calls 98135->98140 98138 7a7eec 59 API calls 98136->98138 98137->98136 98139 7dfc1a 98138->98139 98143 7a9c34 98139->98143 98144 7a77c7 59 API calls 98139->98144 98141 7a9c1b 98140->98141 98141->98139 98142 7a9c26 98141->98142 98142->98143 98145 7a7f41 59 API calls 98142->98145 98143->97851 98143->97853 98144->98143 98145->98143 98147 7a56dd 98146->98147 98148 7a5702 98146->98148 98147->98148 98152 7a56ec 98147->98152 98149 7a7eec 59 API calls 98148->98149 98153 80349a 98149->98153 98150 8034c9 98150->97877 98154 7a5c18 59 API calls 98152->98154 98153->98150 98170 803436 ReadFile SetFilePointerEx 98153->98170 98171 7a7a84 59 API calls 2 library calls 98153->98171 98155 8035ba 98154->98155 98157 7a5632 61 API calls 98155->98157 98158 8035c8 98157->98158 98160 8035d8 Mailbox 98158->98160 98172 7a793a 61 API calls Mailbox 98158->98172 98160->97877 98161->97854 98162->97882 98163->97883 98164->97853 98165->97853 98166->97860 98167->97868 98168->97875 98169->97881 98170->98153 98171->98153 98172->98160 98174 7a9997 84 API calls 98173->98174 98175 81ce2e 98174->98175 98200 81ce75 Mailbox 98175->98200 98211 81dab9 98175->98211 98177 81d0cd 98178 81d242 98177->98178 98182 81d0db 98177->98182 98261 81dbdc 92 API calls Mailbox 98178->98261 98181 81d251 98181->98182 98183 81d25d 98181->98183 98224 81cc82 98182->98224 98183->98200 98184 7a9997 84 API calls 98198 81cec6 Mailbox 98184->98198 98189 81d114 98239 7c0e48 98189->98239 98192 81d147 98246 7a942e 98192->98246 98193 81d12e 98245 80a0b5 89 API calls 4 library calls 98193->98245 98196 81d139 GetCurrentProcess TerminateProcess 98196->98192 98198->98177 98198->98184 98198->98200 98243 80f835 59 API calls 2 library calls 98198->98243 98244 81d2f3 61 API calls 2 library calls 98198->98244 98200->97889 98203 81d2b8 98203->98200 98206 81d2cc FreeLibrary 98203->98206 98204 81d17f 98258 81d95d 107 API calls _free 98204->98258 98206->98200 98210 81d190 98210->98203 98259 7a8ea0 59 API calls Mailbox 98210->98259 98260 7a9e9c 60 API calls Mailbox 98210->98260 98262 81d95d 107 API calls _free 98210->98262 98212 7a7faf 59 API calls 98211->98212 98213 81dad4 CharLowerBuffW 98212->98213 98263 7ff658 98213->98263 98217 7a77c7 59 API calls 98218 81db0d 98217->98218 98219 7a79ab 59 API calls 98218->98219 98221 81db24 98219->98221 98220 81db6c Mailbox 98220->98198 98222 7a7e8c 59 API calls 98221->98222 98223 81db30 Mailbox 98222->98223 98223->98220 98270 81d2f3 61 API calls 2 library calls 98223->98270 98225 81ccf2 98224->98225 98226 81cc9d 98224->98226 98230 81dd64 98225->98230 98227 7c0ff6 Mailbox 59 API calls 98226->98227 98229 81ccbf 98227->98229 98228 7c0ff6 Mailbox 59 API calls 98228->98229 98229->98225 98229->98228 98231 81df8d Mailbox 98230->98231 98238 81dd87 _strcat _wcscpy __wsetenvp 98230->98238 98231->98189 98232 7a9cf8 59 API calls 98232->98238 98233 7a9c9c 59 API calls 98233->98238 98234 7a9d46 59 API calls 98234->98238 98235 7a9997 84 API calls 98235->98238 98236 7c594c 58 API calls std::exception::_Copy_str 98236->98238 98238->98231 98238->98232 98238->98233 98238->98234 98238->98235 98238->98236 98273 805b29 61 API calls 2 library calls 98238->98273 98241 7c0e5d 98239->98241 98240 7c0ef5 VirtualAlloc 98242 7c0ec3 98240->98242 98241->98240 98241->98242 98242->98192 98242->98193 98243->98198 98244->98198 98245->98196 98247 7a9436 98246->98247 98248 7c0ff6 Mailbox 59 API calls 98247->98248 98249 7a9444 98248->98249 98250 7a9450 98249->98250 98274 7a935c 59 API calls Mailbox 98249->98274 98252 7a91b0 98250->98252 98275 7a92c0 98252->98275 98254 7a91bf 98255 7c0ff6 Mailbox 59 API calls 98254->98255 98256 7a925b 98254->98256 98255->98256 98256->98210 98257 7a8ea0 59 API calls Mailbox 98256->98257 98257->98204 98258->98210 98259->98210 98260->98210 98261->98181 98262->98210 98264 7ff683 __wsetenvp 98263->98264 98265 7ff6c2 98264->98265 98268 7ff6b8 98264->98268 98269 7ff769 98264->98269 98265->98217 98265->98223 98268->98265 98271 7a7a24 61 API calls 98268->98271 98269->98265 98272 7a7a24 61 API calls 98269->98272 98270->98220 98271->98268 98272->98269 98273->98238 98274->98250 98276 7a92c9 Mailbox 98275->98276 98277 7df5c8 98276->98277 98282 7a92d3 98276->98282 98278 7c0ff6 Mailbox 59 API calls 98277->98278 98280 7df5d4 98278->98280 98279 7a92da 98279->98254 98282->98279 98283 7a9df0 59 API calls Mailbox 98282->98283 98283->98282 98284->97892 98285->97936 98286->97935 98287->97898 98288->97920 98289->97920 98316 7a7b76 98290->98316 98292 7a65ca 98323 7a766f 98292->98323 98294 7a65e4 Mailbox 98294->97941 98297 7de41f 98333 7ffdba 91 API calls 4 library calls 98297->98333 98298 7a7eec 59 API calls 98310 7a63c5 98298->98310 98299 7a766f 59 API calls 98299->98310 98300 7a68f9 98300->98294 98334 7ffdba 91 API calls 4 library calls 98300->98334 98304 7de42d 98305 7a766f 59 API calls 98304->98305 98306 7de443 98305->98306 98306->98294 98307 7de3bb 98308 7a8189 59 API calls 98307->98308 98309 7de3c6 98308->98309 98314 7c0ff6 Mailbox 59 API calls 98309->98314 98310->98292 98310->98297 98310->98298 98310->98299 98310->98300 98310->98307 98312 7a7faf 59 API calls 98310->98312 98315 7de3eb _memmove 98310->98315 98321 7a60cc 60 API calls 98310->98321 98322 7a5ea1 59 API calls Mailbox 98310->98322 98331 7a5fd2 60 API calls 98310->98331 98332 7a7a84 59 API calls 2 library calls 98310->98332 98313 7a659b CharUpperBuffW 98312->98313 98313->98310 98314->98315 98315->98297 98315->98300 98317 7c0ff6 Mailbox 59 API calls 98316->98317 98318 7a7b9b 98317->98318 98319 7a8189 59 API calls 98318->98319 98320 7a7baa 98319->98320 98320->98310 98321->98310 98322->98310 98324 7a770f 98323->98324 98325 7a7682 _memmove 98323->98325 98327 7c0ff6 Mailbox 59 API calls 98324->98327 98326 7c0ff6 Mailbox 59 API calls 98325->98326 98329 7a7689 98326->98329 98327->98325 98328 7a76b2 98328->98294 98329->98328 98330 7c0ff6 Mailbox 59 API calls 98329->98330 98330->98328 98331->98310 98332->98310 98333->98304 98334->98294 98336 7a77c7 59 API calls 98335->98336 98337 7ff905 98336->98337 98338 7a7b76 59 API calls 98337->98338 98339 7ff919 98338->98339 98340 7ff658 61 API calls 98339->98340 98349 7ff93b 98339->98349 98341 7ff935 98340->98341 98344 7a79ab 59 API calls 98341->98344 98341->98349 98342 7ff658 61 API calls 98342->98349 98343 7ff9b5 98346 7a79ab 59 API calls 98343->98346 98344->98349 98345 7a79ab 59 API calls 98345->98349 98348 7ff9ce 98346->98348 98347 7a7c8e 59 API calls 98347->98349 98350 7a7c8e 59 API calls 98348->98350 98349->98342 98349->98343 98349->98345 98349->98347 98351 7ff9da 98350->98351 98353 7ff9e9 Mailbox 98351->98353 98355 7a80d7 59 API calls 2 library calls 98351->98355 98353->97948 98354->97950 98355->98353 98357 7f665e 98356->98357 98358 7f6641 98356->98358 98357->97956 98358->98357 98360 7f6621 59 API calls Mailbox 98358->98360 98360->98358 98361 7a3633 98362 7a366a 98361->98362 98363 7a3688 98362->98363 98364 7a36e7 98362->98364 98401 7a36e5 98362->98401 98365 7a375d PostQuitMessage 98363->98365 98366 7a3695 98363->98366 98368 7dd31c 98364->98368 98369 7a36ed 98364->98369 98402 7a36d8 98365->98402 98370 7dd38f 98366->98370 98371 7a36a0 98366->98371 98367 7a36ca DefWindowProcW 98367->98402 98411 7b11d0 10 API calls Mailbox 98368->98411 98373 7a36f2 98369->98373 98374 7a3715 SetTimer RegisterWindowMessageW 98369->98374 98426 802a16 71 API calls _memset 98370->98426 98375 7a36a8 98371->98375 98376 7a3767 98371->98376 98380 7dd2bf 98373->98380 98381 7a36f9 KillTimer 98373->98381 98377 7a373e CreatePopupMenu 98374->98377 98374->98402 98382 7a36b3 98375->98382 98389 7dd374 98375->98389 98409 7a4531 64 API calls _memset 98376->98409 98377->98402 98379 7dd343 98412 7b11f3 341 API calls Mailbox 98379->98412 98385 7dd2f8 MoveWindow 98380->98385 98386 7dd2c4 98380->98386 98406 7a44cb Shell_NotifyIconW _memset 98381->98406 98390 7a374b 98382->98390 98391 7a36be 98382->98391 98385->98402 98394 7dd2c8 98386->98394 98395 7dd2e7 SetFocus 98386->98395 98388 7a370c 98407 7a3114 DeleteObject DestroyWindow Mailbox 98388->98407 98389->98367 98425 7f817e 59 API calls Mailbox 98389->98425 98408 7a45df 81 API calls _memset 98390->98408 98391->98367 98413 7a44cb Shell_NotifyIconW _memset 98391->98413 98392 7dd3a1 98392->98367 98392->98402 98393 7a375b 98393->98402 98394->98391 98399 7dd2d1 98394->98399 98395->98402 98410 7b11d0 10 API calls Mailbox 98399->98410 98401->98367 98404 7dd368 98414 7a43db 98404->98414 98406->98388 98407->98402 98408->98393 98409->98393 98410->98402 98411->98379 98412->98391 98413->98404 98415 7a4406 _memset 98414->98415 98427 7a4213 98415->98427 98418 7a448b 98420 7a44c1 Shell_NotifyIconW 98418->98420 98421 7a44a5 Shell_NotifyIconW 98418->98421 98422 7a44b3 98420->98422 98421->98422 98431 7a410d 98422->98431 98424 7a44ba 98424->98401 98425->98401 98426->98392 98428 7dd638 98427->98428 98429 7a4227 98427->98429 98428->98429 98430 7dd641 DestroyIcon 98428->98430 98429->98418 98453 803226 62 API calls _W_store_winword 98429->98453 98430->98429 98432 7a4129 98431->98432 98452 7a4200 Mailbox 98431->98452 98433 7a7b76 59 API calls 98432->98433 98434 7a4137 98433->98434 98435 7dd5dd LoadStringW 98434->98435 98436 7a4144 98434->98436 98439 7dd5f7 98435->98439 98437 7a7d2c 59 API calls 98436->98437 98438 7a4159 98437->98438 98438->98439 98440 7a416a 98438->98440 98441 7a7c8e 59 API calls 98439->98441 98442 7a4174 98440->98442 98443 7a4205 98440->98443 98446 7dd601 98441->98446 98445 7a7c8e 59 API calls 98442->98445 98444 7a81a7 59 API calls 98443->98444 98449 7a417e _memset _wcscpy 98444->98449 98445->98449 98447 7a7e0b 59 API calls 98446->98447 98446->98449 98448 7dd623 98447->98448 98451 7a7e0b 59 API calls 98448->98451 98450 7a41e6 Shell_NotifyIconW 98449->98450 98450->98452 98451->98449 98452->98424 98453->98418 98454 7dff06 98455 7dff10 98454->98455 98491 7aac90 Mailbox _memmove 98454->98491 98595 7a8e34 59 API calls Mailbox 98455->98595 98456 7c0ff6 59 API calls Mailbox 98456->98491 98462 7ab5d5 98466 7a81a7 59 API calls 98462->98466 98464 7c0ff6 59 API calls Mailbox 98478 7aa097 Mailbox 98464->98478 98476 7aa1b7 98466->98476 98467 7e047f 98599 80a0b5 89 API calls 4 library calls 98467->98599 98468 7ab5da 98605 80a0b5 89 API calls 4 library calls 98468->98605 98470 7a7f41 59 API calls 98470->98491 98472 7a81a7 59 API calls 98472->98478 98473 7a77c7 59 API calls 98473->98478 98474 7e048e 98475 7f7405 59 API calls 98475->98478 98478->98462 98478->98464 98478->98467 98478->98468 98478->98472 98478->98473 98478->98475 98478->98476 98480 7e0e00 98478->98480 98482 7c2f80 67 API calls __cinit 98478->98482 98484 7aa6ba 98478->98484 98589 7aca20 341 API calls 2 library calls 98478->98589 98590 7aba60 60 API calls Mailbox 98478->98590 98479 7f66f4 Mailbox 59 API calls 98479->98476 98604 80a0b5 89 API calls 4 library calls 98480->98604 98482->98478 98603 80a0b5 89 API calls 4 library calls 98484->98603 98485 7f66f4 Mailbox 59 API calls 98485->98491 98486 7ab416 98594 7af803 341 API calls 98486->98594 98487 7aa000 341 API calls 98487->98491 98489 7e0c94 98601 7a9df0 59 API calls Mailbox 98489->98601 98491->98456 98491->98470 98491->98476 98491->98478 98491->98485 98491->98486 98491->98487 98491->98489 98492 7e0ca2 98491->98492 98495 7ab37c 98491->98495 98498 7aade2 Mailbox 98491->98498 98501 7ab685 98491->98501 98511 81c5f4 98491->98511 98543 807be0 98491->98543 98549 81bf80 98491->98549 98596 7f7405 59 API calls 98491->98596 98597 81c4a7 85 API calls 2 library calls 98491->98597 98602 80a0b5 89 API calls 4 library calls 98492->98602 98494 7e0c86 98494->98476 98494->98479 98592 7a9e9c 60 API calls Mailbox 98495->98592 98497 7ab38d 98593 7a9e9c 60 API calls Mailbox 98497->98593 98498->98476 98498->98494 98498->98501 98504 7e00e0 VariantClear 98498->98504 98505 80d2e5 101 API calls 98498->98505 98506 80d2e6 101 API calls 98498->98506 98507 81e237 130 API calls 98498->98507 98508 7b2123 95 API calls 98498->98508 98509 81474d 341 API calls 98498->98509 98510 82251d 62 API calls 98498->98510 98591 7a9df0 59 API calls Mailbox 98498->98591 98598 7f7405 59 API calls 98498->98598 98600 80a0b5 89 API calls 4 library calls 98501->98600 98504->98498 98505->98498 98506->98498 98507->98498 98508->98498 98509->98498 98510->98498 98512 7a77c7 59 API calls 98511->98512 98513 81c608 98512->98513 98514 7a77c7 59 API calls 98513->98514 98515 81c610 98514->98515 98516 7a77c7 59 API calls 98515->98516 98517 81c618 98516->98517 98518 7a9997 84 API calls 98517->98518 98541 81c626 98518->98541 98519 7a7d2c 59 API calls 98519->98541 98520 81c80f 98521 81c83c Mailbox 98520->98521 98608 7a9b9c 59 API calls Mailbox 98520->98608 98521->98491 98523 81c7f6 98524 7a7e0b 59 API calls 98523->98524 98527 81c803 98524->98527 98525 7a7a84 59 API calls 98525->98541 98526 81c811 98528 7a7e0b 59 API calls 98526->98528 98530 7a7c8e 59 API calls 98527->98530 98531 81c820 98528->98531 98529 7a81a7 59 API calls 98529->98541 98530->98520 98534 7a7c8e 59 API calls 98531->98534 98532 7a7faf 59 API calls 98533 81c6bd CharUpperBuffW 98532->98533 98606 7a859a 68 API calls 98533->98606 98534->98520 98535 7a7faf 59 API calls 98537 81c77d CharUpperBuffW 98535->98537 98607 7ac707 69 API calls 2 library calls 98537->98607 98539 7a9997 84 API calls 98539->98541 98540 7a7c8e 59 API calls 98540->98541 98541->98519 98541->98520 98541->98521 98541->98523 98541->98525 98541->98526 98541->98529 98541->98532 98541->98535 98541->98539 98541->98540 98542 7a7e0b 59 API calls 98541->98542 98542->98541 98544 807bec 98543->98544 98545 7c0ff6 Mailbox 59 API calls 98544->98545 98546 807bfa 98545->98546 98547 807c08 98546->98547 98548 7a77c7 59 API calls 98546->98548 98547->98491 98548->98547 98550 81bfc5 98549->98550 98551 81bfab 98549->98551 98610 81a528 59 API calls Mailbox 98550->98610 98609 80a0b5 89 API calls 4 library calls 98551->98609 98554 81bfd0 98555 7aa000 340 API calls 98554->98555 98556 81c031 98555->98556 98557 81bfbd Mailbox 98556->98557 98558 81c0c3 98556->98558 98561 81c072 98556->98561 98557->98491 98559 81c119 98558->98559 98560 81c0c9 98558->98560 98559->98557 98562 7a9997 84 API calls 98559->98562 98631 807ba4 59 API calls 98560->98631 98611 807581 59 API calls Mailbox 98561->98611 98563 81c12b 98562->98563 98567 7a7faf 59 API calls 98563->98567 98565 81c0ec 98632 7a5ea1 59 API calls Mailbox 98565->98632 98570 81c14f CharUpperBuffW 98567->98570 98569 81c0a2 98612 7af5c0 98569->98612 98573 81c169 98570->98573 98571 81c0f4 Mailbox 98633 7afe40 341 API calls 2 library calls 98571->98633 98574 81c170 98573->98574 98575 81c1bc 98573->98575 98634 807581 59 API calls Mailbox 98574->98634 98577 7a9997 84 API calls 98575->98577 98578 81c1c4 98577->98578 98635 7a9fbd 60 API calls 98578->98635 98581 81c19e 98582 7af5c0 340 API calls 98581->98582 98582->98557 98583 81c1ce 98583->98557 98584 7a9997 84 API calls 98583->98584 98585 81c1e9 98584->98585 98636 7a5ea1 59 API calls Mailbox 98585->98636 98587 81c1f9 98637 7afe40 341 API calls 2 library calls 98587->98637 98589->98478 98590->98478 98591->98498 98592->98497 98593->98486 98594->98501 98595->98491 98596->98491 98597->98491 98598->98498 98599->98474 98600->98494 98601->98494 98602->98494 98603->98476 98604->98468 98605->98476 98606->98541 98607->98541 98608->98521 98609->98557 98610->98554 98611->98569 98613 7af61a 98612->98613 98614 7af7b0 98612->98614 98615 7e4848 98613->98615 98616 7af626 98613->98616 98617 7a7f41 59 API calls 98614->98617 98618 81bf80 341 API calls 98615->98618 98727 7af3f0 341 API calls 2 library calls 98616->98727 98623 7af6ec Mailbox 98617->98623 98620 7e4856 98618->98620 98624 7af790 98620->98624 98729 80a0b5 89 API calls 4 library calls 98620->98729 98622 7af65d 98622->98620 98622->98623 98622->98624 98626 7af743 98623->98626 98628 803e73 3 API calls 98623->98628 98638 7a4faa 98623->98638 98644 81e24b 98623->98644 98647 80cde5 98623->98647 98624->98557 98626->98624 98728 7a9df0 59 API calls Mailbox 98626->98728 98628->98626 98631->98565 98632->98571 98633->98557 98634->98581 98635->98583 98636->98587 98637->98557 98639 7a4fb4 98638->98639 98641 7a4fbb 98638->98641 98730 7c55d6 98639->98730 98642 7a4fca 98641->98642 98643 7a4fdb FreeLibrary 98641->98643 98642->98626 98643->98642 98645 81cdf1 130 API calls 98644->98645 98646 81e25b 98645->98646 98646->98626 98648 7a77c7 59 API calls 98647->98648 98649 80ce1a 98648->98649 98650 7a77c7 59 API calls 98649->98650 98651 80ce23 98650->98651 98652 80ce37 98651->98652 99137 7a9c9c 59 API calls 98651->99137 98654 7a9997 84 API calls 98652->98654 98655 80ce54 98654->98655 98656 80cf55 98655->98656 98657 80ce76 98655->98657 98669 80cf85 Mailbox 98655->98669 99004 7a4f3d 98656->99004 98658 7a9997 84 API calls 98657->98658 98660 80ce82 98658->98660 98662 7a81a7 59 API calls 98660->98662 98664 80ce8e 98662->98664 98663 80cf81 98666 7a77c7 59 API calls 98663->98666 98663->98669 98671 80cea2 98664->98671 98672 80ced4 98664->98672 98665 7a4f3d 136 API calls 98665->98663 98667 80cfb6 98666->98667 98668 7a77c7 59 API calls 98667->98668 98670 80cfbf 98668->98670 98669->98626 98674 7a77c7 59 API calls 98670->98674 98675 7a81a7 59 API calls 98671->98675 98673 7a9997 84 API calls 98672->98673 98676 80cee1 98673->98676 98677 80cfc8 98674->98677 98678 80ceb2 98675->98678 98679 7a81a7 59 API calls 98676->98679 98680 7a77c7 59 API calls 98677->98680 98681 7a7e0b 59 API calls 98678->98681 98682 80ceed 98679->98682 98683 80cfd1 98680->98683 98684 80cebc 98681->98684 99138 804cd3 GetFileAttributesW 98682->99138 98686 7a9997 84 API calls 98683->98686 98687 7a9997 84 API calls 98684->98687 98688 80cfde 98686->98688 98689 80cec8 98687->98689 98692 7a46f9 59 API calls 98688->98692 98693 7a7c8e 59 API calls 98689->98693 98690 80cf09 98696 7a9997 84 API calls 98690->98696 98701 80cf0f 98690->98701 98691 80cef6 98691->98690 98694 7a7b52 59 API calls 98691->98694 98695 80cff9 98692->98695 98693->98672 98694->98690 98697 7a7b52 59 API calls 98695->98697 98698 80cf36 98696->98698 98700 80d008 98697->98700 99139 803a2b 75 API calls Mailbox 98698->99139 98702 80d03c 98700->98702 98704 7a7b52 59 API calls 98700->98704 98701->98669 98703 7a81a7 59 API calls 98702->98703 98705 80d04a 98703->98705 98706 80d019 98704->98706 98707 7a7c8e 59 API calls 98705->98707 98706->98702 98708 7a7d2c 59 API calls 98706->98708 98709 80d058 98707->98709 98710 80d02e 98708->98710 98711 7a7c8e 59 API calls 98709->98711 98712 7a7d2c 59 API calls 98710->98712 98713 80d066 98711->98713 98712->98702 98714 7a7c8e 59 API calls 98713->98714 98715 80d074 98714->98715 98716 7a9997 84 API calls 98715->98716 98717 80d080 98716->98717 99028 8042ad 98717->99028 98719 80d091 98720 803e73 3 API calls 98719->98720 98721 80d09b 98720->98721 98722 7a9997 84 API calls 98721->98722 98726 80d0cc 98721->98726 98723 80d0b9 98722->98723 99082 8093df 98723->99082 98725 7a4faa 84 API calls 98725->98669 98726->98725 98727->98622 98728->98626 98729->98624 98731 7c55e2 __lseeki64 98730->98731 98732 7c560e 98731->98732 98733 7c55f6 98731->98733 98739 7c5606 __lseeki64 98732->98739 98743 7c6e4e 98732->98743 98765 7c8d68 58 API calls __getptd_noexit 98733->98765 98735 7c55fb 98766 7c8ff6 9 API calls wcstoxl 98735->98766 98739->98641 98744 7c6e5e 98743->98744 98745 7c6e80 EnterCriticalSection 98743->98745 98744->98745 98746 7c6e66 98744->98746 98747 7c5620 98745->98747 98748 7c9e4b __lock 58 API calls 98746->98748 98749 7c556a 98747->98749 98748->98747 98750 7c558d 98749->98750 98751 7c5579 98749->98751 98753 7c5589 98750->98753 98768 7c4c6d 98750->98768 98811 7c8d68 58 API calls __getptd_noexit 98751->98811 98767 7c5645 LeaveCriticalSection LeaveCriticalSection _fseek 98753->98767 98754 7c557e 98812 7c8ff6 9 API calls wcstoxl 98754->98812 98761 7c55a7 98785 7d0c52 98761->98785 98763 7c55ad 98763->98753 98764 7c2f95 _free 58 API calls 98763->98764 98764->98753 98765->98735 98766->98739 98767->98739 98769 7c4c80 98768->98769 98770 7c4ca4 98768->98770 98769->98770 98771 7c4916 __fseek_nolock 58 API calls 98769->98771 98774 7d0dc7 98770->98774 98772 7c4c9d 98771->98772 98813 7cdac6 98772->98813 98775 7c55a1 98774->98775 98776 7d0dd4 98774->98776 98778 7c4916 98775->98778 98776->98775 98777 7c2f95 _free 58 API calls 98776->98777 98777->98775 98779 7c4935 98778->98779 98780 7c4920 98778->98780 98779->98761 98959 7c8d68 58 API calls __getptd_noexit 98780->98959 98782 7c4925 98960 7c8ff6 9 API calls wcstoxl 98782->98960 98784 7c4930 98784->98761 98786 7d0c5e __lseeki64 98785->98786 98787 7d0c6b 98786->98787 98788 7d0c82 98786->98788 98976 7c8d34 58 API calls __getptd_noexit 98787->98976 98790 7d0d0d 98788->98790 98792 7d0c92 98788->98792 98981 7c8d34 58 API calls __getptd_noexit 98790->98981 98791 7d0c70 98977 7c8d68 58 API calls __getptd_noexit 98791->98977 98795 7d0cba 98792->98795 98796 7d0cb0 98792->98796 98799 7cd446 ___lock_fhandle 59 API calls 98795->98799 98978 7c8d34 58 API calls __getptd_noexit 98796->98978 98797 7d0cb5 98982 7c8d68 58 API calls __getptd_noexit 98797->98982 98801 7d0cc0 98799->98801 98803 7d0cde 98801->98803 98804 7d0cd3 98801->98804 98802 7d0d19 98983 7c8ff6 9 API calls wcstoxl 98802->98983 98979 7c8d68 58 API calls __getptd_noexit 98803->98979 98961 7d0d2d 98804->98961 98805 7d0c77 __lseeki64 98805->98763 98809 7d0cd9 98980 7d0d05 LeaveCriticalSection __unlock_fhandle 98809->98980 98811->98754 98812->98753 98814 7cdad2 __lseeki64 98813->98814 98815 7cdadf 98814->98815 98816 7cdaf6 98814->98816 98914 7c8d34 58 API calls __getptd_noexit 98815->98914 98817 7cdb95 98816->98817 98819 7cdb0a 98816->98819 98920 7c8d34 58 API calls __getptd_noexit 98817->98920 98822 7cdb28 98819->98822 98823 7cdb32 98819->98823 98821 7cdae4 98915 7c8d68 58 API calls __getptd_noexit 98821->98915 98916 7c8d34 58 API calls __getptd_noexit 98822->98916 98841 7cd446 98823->98841 98824 7cdb2d 98921 7c8d68 58 API calls __getptd_noexit 98824->98921 98828 7cdb38 98830 7cdb5e 98828->98830 98831 7cdb4b 98828->98831 98917 7c8d68 58 API calls __getptd_noexit 98830->98917 98850 7cdbb5 98831->98850 98832 7cdba1 98922 7c8ff6 9 API calls wcstoxl 98832->98922 98836 7cdaeb __lseeki64 98836->98770 98837 7cdb57 98919 7cdb8d LeaveCriticalSection __unlock_fhandle 98837->98919 98838 7cdb63 98918 7c8d34 58 API calls __getptd_noexit 98838->98918 98842 7cd452 __lseeki64 98841->98842 98843 7cd4a1 EnterCriticalSection 98842->98843 98845 7c9e4b __lock 58 API calls 98842->98845 98844 7cd4c7 __lseeki64 98843->98844 98844->98828 98846 7cd477 98845->98846 98849 7cd48f 98846->98849 98923 7ca06b InitializeCriticalSectionAndSpinCount 98846->98923 98924 7cd4cb LeaveCriticalSection _doexit 98849->98924 98851 7cdbc2 __write_nolock 98850->98851 98852 7cdc01 98851->98852 98855 7cdc20 98851->98855 98884 7cdbf6 98851->98884 98934 7c8d34 58 API calls __getptd_noexit 98852->98934 98856 7cdc5c 98855->98856 98857 7cdc78 98855->98857 98937 7c8d34 58 API calls __getptd_noexit 98856->98937 98862 7cdc91 98857->98862 98940 7d1b11 60 API calls 3 library calls 98857->98940 98858 7ce416 98858->98837 98859 7cdc06 98935 7c8d68 58 API calls __getptd_noexit 98859->98935 98925 7d5ebb 98862->98925 98863 7cdc61 98938 7c8d68 58 API calls __getptd_noexit 98863->98938 98864 7cdc0d 98936 7c8ff6 9 API calls wcstoxl 98864->98936 98869 7cdc9f 98871 7cdff8 98869->98871 98941 7c9bec 58 API calls 2 library calls 98869->98941 98870 7cdc68 98939 7c8ff6 9 API calls wcstoxl 98870->98939 98872 7ce38b WriteFile 98871->98872 98873 7ce016 98871->98873 98876 7cdfeb GetLastError 98872->98876 98886 7cdfb8 98872->98886 98877 7ce13a 98873->98877 98883 7ce02c 98873->98883 98876->98886 98888 7ce22f 98877->98888 98890 7ce145 98877->98890 98878 7cdccb GetConsoleMode 98878->98871 98880 7cdd0a 98878->98880 98879 7ce3c4 98879->98884 98946 7c8d68 58 API calls __getptd_noexit 98879->98946 98880->98871 98881 7cdd1a GetConsoleCP 98880->98881 98881->98879 98911 7cdd49 98881->98911 98882 7ce09b WriteFile 98882->98876 98889 7ce0d8 98882->98889 98883->98879 98883->98882 98948 7cc836 98884->98948 98886->98879 98886->98884 98887 7ce118 98886->98887 98892 7ce3bb 98887->98892 98893 7ce123 98887->98893 98888->98879 98894 7ce2a4 WideCharToMultiByte 98888->98894 98889->98883 98895 7ce0fc 98889->98895 98890->98879 98896 7ce1aa WriteFile 98890->98896 98891 7ce3f2 98947 7c8d34 58 API calls __getptd_noexit 98891->98947 98945 7c8d47 58 API calls 3 library calls 98892->98945 98943 7c8d68 58 API calls __getptd_noexit 98893->98943 98894->98876 98907 7ce2eb 98894->98907 98895->98886 98896->98876 98900 7ce1f9 98896->98900 98900->98886 98900->98890 98900->98895 98901 7ce128 98944 7c8d34 58 API calls __getptd_noexit 98901->98944 98902 7ce2f3 WriteFile 98905 7ce346 GetLastError 98902->98905 98902->98907 98905->98907 98906 7d650a 60 API calls __write_nolock 98906->98911 98907->98886 98907->98888 98907->98895 98907->98902 98908 7d7cae WriteConsoleW CreateFileW __putwch_nolock 98912 7cde9f 98908->98912 98909 7cde32 WideCharToMultiByte 98909->98886 98910 7cde6d WriteFile 98909->98910 98910->98876 98910->98912 98911->98886 98911->98906 98911->98909 98911->98912 98942 7c3835 58 API calls __isleadbyte_l 98911->98942 98912->98876 98912->98886 98912->98908 98912->98911 98913 7cdec7 WriteFile 98912->98913 98913->98876 98913->98912 98914->98821 98915->98836 98916->98824 98917->98838 98918->98837 98919->98836 98920->98824 98921->98832 98922->98836 98923->98849 98924->98843 98926 7d5ec6 98925->98926 98927 7d5ed3 98925->98927 98955 7c8d68 58 API calls __getptd_noexit 98926->98955 98929 7d5edf 98927->98929 98956 7c8d68 58 API calls __getptd_noexit 98927->98956 98929->98869 98931 7d5ecb 98931->98869 98932 7d5f00 98957 7c8ff6 9 API calls wcstoxl 98932->98957 98934->98859 98935->98864 98936->98884 98937->98863 98938->98870 98939->98884 98940->98862 98941->98878 98942->98911 98943->98901 98944->98884 98945->98884 98946->98891 98947->98884 98949 7cc83e 98948->98949 98950 7cc840 IsProcessorFeaturePresent 98948->98950 98949->98858 98952 7d5b5a 98950->98952 98958 7d5b09 5 API calls 2 library calls 98952->98958 98954 7d5c3d 98954->98858 98955->98931 98956->98932 98957->98931 98958->98954 98959->98782 98960->98784 98984 7cd703 98961->98984 98963 7d0d91 98997 7cd67d 59 API calls 2 library calls 98963->98997 98964 7d0d3b 98964->98963 98966 7d0d6f 98964->98966 98968 7cd703 __lseeki64_nolock 58 API calls 98964->98968 98966->98963 98969 7cd703 __lseeki64_nolock 58 API calls 98966->98969 98967 7d0d99 98970 7d0dbb 98967->98970 98998 7c8d47 58 API calls 3 library calls 98967->98998 98971 7d0d66 98968->98971 98972 7d0d7b FindCloseChangeNotification 98969->98972 98970->98809 98974 7cd703 __lseeki64_nolock 58 API calls 98971->98974 98972->98963 98975 7d0d87 GetLastError 98972->98975 98974->98966 98975->98963 98976->98791 98977->98805 98978->98797 98979->98809 98980->98805 98981->98797 98982->98802 98983->98805 98985 7cd70e 98984->98985 98988 7cd723 98984->98988 98999 7c8d34 58 API calls __getptd_noexit 98985->98999 98987 7cd713 99000 7c8d68 58 API calls __getptd_noexit 98987->99000 98991 7cd748 98988->98991 99001 7c8d34 58 API calls __getptd_noexit 98988->99001 98991->98964 98992 7cd752 99002 7c8d68 58 API calls __getptd_noexit 98992->99002 98994 7cd71b 98994->98964 98995 7cd75a 99003 7c8ff6 9 API calls wcstoxl 98995->99003 98997->98967 98998->98970 98999->98987 99000->98994 99001->98992 99002->98995 99003->98994 99140 7a4d13 99004->99140 99009 7ddd0f 99012 7a4faa 84 API calls 99009->99012 99010 7a4f68 LoadLibraryExW 99150 7a4cc8 99010->99150 99014 7ddd16 99012->99014 99015 7a4cc8 3 API calls 99014->99015 99017 7ddd1e 99015->99017 99176 7a506b 99017->99176 99018 7a4f8f 99018->99017 99019 7a4f9b 99018->99019 99021 7a4faa 84 API calls 99019->99021 99023 7a4fa0 99021->99023 99023->98663 99023->98665 99025 7ddd45 99184 7a5027 99025->99184 99029 8042c9 99028->99029 99030 8042dc 99029->99030 99031 8042ce 99029->99031 99033 7a77c7 59 API calls 99030->99033 99032 7a81a7 59 API calls 99031->99032 99034 8042d7 Mailbox 99032->99034 99035 8042e4 99033->99035 99034->98719 99036 7a77c7 59 API calls 99035->99036 99037 8042ec 99036->99037 99038 7a77c7 59 API calls 99037->99038 99039 8042f7 99038->99039 99040 7a77c7 59 API calls 99039->99040 99041 8042ff 99040->99041 99137->98652 99138->98691 99139->98701 99189 7a4d61 99140->99189 99143 7a4d3a 99145 7a4d4a FreeLibrary 99143->99145 99146 7a4d53 99143->99146 99144 7a4d61 2 API calls 99144->99143 99145->99146 99147 7c548b 99146->99147 99193 7c54a0 99147->99193 99149 7a4f5c 99149->99009 99149->99010 99351 7a4d94 99150->99351 99153 7a4d94 2 API calls 99156 7a4ced 99153->99156 99154 7a4d08 99157 7a4dd0 99154->99157 99155 7a4cff FreeLibrary 99155->99154 99156->99154 99156->99155 99158 7c0ff6 Mailbox 59 API calls 99157->99158 99159 7a4de5 99158->99159 99160 7a538e 59 API calls 99159->99160 99161 7a4df1 _memmove 99160->99161 99162 7a4e2c 99161->99162 99164 7a4ee9 99161->99164 99165 7a4f21 99161->99165 99163 7a5027 69 API calls 99162->99163 99172 7a4e35 99163->99172 99355 7a4fe9 CreateStreamOnHGlobal 99164->99355 99366 809ba5 95 API calls 99165->99366 99168 7a506b 74 API calls 99168->99172 99170 7a4ec9 99170->99018 99171 7ddcd0 99173 7a5045 85 API calls 99171->99173 99172->99168 99172->99170 99172->99171 99361 7a5045 99172->99361 99174 7ddce4 99173->99174 99175 7a506b 74 API calls 99174->99175 99175->99170 99177 7a507d 99176->99177 99178 7dddf6 99176->99178 99384 7c5812 99177->99384 99181 809393 99564 8091e9 99181->99564 99183 8093a9 99183->99025 99185 7dddb9 99184->99185 99186 7a5036 99184->99186 99569 7c5e90 99186->99569 99188 7a503e 99190 7a4d2e 99189->99190 99191 7a4d6a LoadLibraryA 99189->99191 99190->99143 99190->99144 99191->99190 99192 7a4d7b GetProcAddress 99191->99192 99192->99190 99195 7c54ac __lseeki64 99193->99195 99194 7c54bf 99242 7c8d68 58 API calls __getptd_noexit 99194->99242 99195->99194 99197 7c54f0 99195->99197 99212 7d0738 99197->99212 99198 7c54c4 99243 7c8ff6 9 API calls wcstoxl 99198->99243 99201 7c54f5 99202 7c54fe 99201->99202 99203 7c550b 99201->99203 99244 7c8d68 58 API calls __getptd_noexit 99202->99244 99205 7c5535 99203->99205 99206 7c5515 99203->99206 99227 7d0857 99205->99227 99245 7c8d68 58 API calls __getptd_noexit 99206->99245 99210 7c54cf __lseeki64 @_EH4_CallFilterFunc@8 99210->99149 99213 7d0744 __lseeki64 99212->99213 99214 7c9e4b __lock 58 API calls 99213->99214 99225 7d0752 99214->99225 99215 7d07c6 99247 7d084e 99215->99247 99216 7d07cd 99252 7c8a5d 58 API calls 2 library calls 99216->99252 99219 7d07d4 99219->99215 99253 7ca06b InitializeCriticalSectionAndSpinCount 99219->99253 99220 7d0843 __lseeki64 99220->99201 99222 7c9ed3 __mtinitlocknum 58 API calls 99222->99225 99224 7d07fa EnterCriticalSection 99224->99215 99225->99215 99225->99216 99225->99222 99250 7c6e8d 59 API calls __lock 99225->99250 99251 7c6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99225->99251 99235 7d0877 __wopenfile 99227->99235 99228 7d0891 99258 7c8d68 58 API calls __getptd_noexit 99228->99258 99230 7d0a4c 99230->99228 99234 7d0aaf 99230->99234 99231 7d0896 99259 7c8ff6 9 API calls wcstoxl 99231->99259 99233 7c5540 99246 7c5562 LeaveCriticalSection LeaveCriticalSection _fseek 99233->99246 99255 7d87f1 99234->99255 99235->99228 99235->99230 99260 7c3a0b 60 API calls 2 library calls 99235->99260 99238 7d0a45 99238->99230 99261 7c3a0b 60 API calls 2 library calls 99238->99261 99240 7d0a64 99240->99230 99262 7c3a0b 60 API calls 2 library calls 99240->99262 99242->99198 99243->99210 99244->99210 99245->99210 99246->99210 99254 7c9fb5 LeaveCriticalSection 99247->99254 99249 7d0855 99249->99220 99250->99225 99251->99225 99252->99219 99253->99224 99254->99249 99263 7d7fd5 99255->99263 99257 7d880a 99257->99233 99258->99231 99259->99233 99260->99238 99261->99240 99262->99230 99264 7d7fe1 __lseeki64 99263->99264 99265 7d7ff7 99264->99265 99268 7d802d 99264->99268 99348 7c8d68 58 API calls __getptd_noexit 99265->99348 99267 7d7ffc 99349 7c8ff6 9 API calls wcstoxl 99267->99349 99274 7d809e 99268->99274 99271 7d8049 99350 7d8072 LeaveCriticalSection __unlock_fhandle 99271->99350 99272 7d8006 __lseeki64 99272->99257 99275 7d80be 99274->99275 99276 7c471a __wsopen_nolock 58 API calls 99275->99276 99279 7d80da 99276->99279 99277 7c9006 __invoke_watson 8 API calls 99278 7d87f0 99277->99278 99281 7d7fd5 __wsopen_helper 103 API calls 99278->99281 99280 7d8114 99279->99280 99287 7d8137 99279->99287 99347 7d8211 99279->99347 99282 7c8d34 __lseeki64 58 API calls 99280->99282 99283 7d880a 99281->99283 99284 7d8119 99282->99284 99283->99271 99285 7c8d68 wcstoxl 58 API calls 99284->99285 99286 7d8126 99285->99286 99289 7c8ff6 wcstoxl 9 API calls 99286->99289 99288 7d81f5 99287->99288 99296 7d81d3 99287->99296 99290 7c8d34 __lseeki64 58 API calls 99288->99290 99291 7d8130 99289->99291 99292 7d81fa 99290->99292 99291->99271 99293 7c8d68 wcstoxl 58 API calls 99292->99293 99294 7d8207 99293->99294 99295 7c8ff6 wcstoxl 9 API calls 99294->99295 99295->99347 99297 7cd4d4 __alloc_osfhnd 61 API calls 99296->99297 99298 7d82a1 99297->99298 99299 7d82ce 99298->99299 99300 7d82ab 99298->99300 99301 7d7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99299->99301 99302 7c8d34 __lseeki64 58 API calls 99300->99302 99311 7d82f0 99301->99311 99303 7d82b0 99302->99303 99305 7c8d68 wcstoxl 58 API calls 99303->99305 99304 7d836e GetFileType 99308 7d8379 GetLastError 99304->99308 99309 7d83bb 99304->99309 99307 7d82ba 99305->99307 99306 7d833c GetLastError 99312 7c8d47 __dosmaperr 58 API calls 99306->99312 99313 7c8d68 wcstoxl 58 API calls 99307->99313 99310 7c8d47 __dosmaperr 58 API calls 99308->99310 99319 7cd76a __set_osfhnd 59 API calls 99309->99319 99314 7d83a0 CloseHandle 99310->99314 99311->99304 99311->99306 99315 7d7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99311->99315 99316 7d8361 99312->99316 99313->99291 99314->99316 99317 7d83ae 99314->99317 99318 7d8331 99315->99318 99321 7c8d68 wcstoxl 58 API calls 99316->99321 99320 7c8d68 wcstoxl 58 API calls 99317->99320 99318->99304 99318->99306 99323 7d83d9 99319->99323 99322 7d83b3 99320->99322 99321->99347 99322->99316 99324 7d8594 99323->99324 99325 7d1b11 __lseeki64_nolock 60 API calls 99323->99325 99342 7d845a 99323->99342 99327 7d8767 CloseHandle 99324->99327 99324->99347 99326 7d8443 99325->99326 99330 7c8d34 __lseeki64 58 API calls 99326->99330 99326->99342 99328 7d7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99327->99328 99329 7d878e 99328->99329 99331 7d87c2 99329->99331 99332 7d8796 GetLastError 99329->99332 99330->99342 99331->99347 99333 7c8d47 __dosmaperr 58 API calls 99332->99333 99334 7d87a2 99333->99334 99338 7cd67d __free_osfhnd 59 API calls 99334->99338 99335 7d0d2d __close_nolock 61 API calls 99335->99342 99336 7d10ab 70 API calls __read_nolock 99336->99342 99337 7d848c 99339 7d99f2 __chsize_nolock 82 API calls 99337->99339 99337->99342 99338->99331 99339->99337 99340 7cdac6 __write 78 API calls 99340->99342 99341 7d8611 99343 7d0d2d __close_nolock 61 API calls 99341->99343 99342->99324 99342->99335 99342->99336 99342->99337 99342->99340 99342->99341 99345 7d1b11 60 API calls __lseeki64_nolock 99342->99345 99344 7d8618 99343->99344 99346 7c8d68 wcstoxl 58 API calls 99344->99346 99345->99342 99346->99347 99347->99277 99348->99267 99349->99272 99350->99272 99352 7a4ce1 99351->99352 99353 7a4d9d LoadLibraryA 99351->99353 99352->99153 99352->99156 99353->99352 99354 7a4dae GetProcAddress 99353->99354 99354->99352 99356 7a5003 FindResourceExW 99355->99356 99358 7a5020 99355->99358 99357 7ddd5c LoadResource 99356->99357 99356->99358 99357->99358 99359 7ddd71 SizeofResource 99357->99359 99358->99162 99359->99358 99360 7ddd85 LockResource 99359->99360 99360->99358 99362 7dddd4 99361->99362 99363 7a5054 99361->99363 99367 7c5a7d 99363->99367 99365 7a5062 99365->99172 99366->99162 99368 7c5a89 __lseeki64 99367->99368 99369 7c5a9b 99368->99369 99371 7c5ac1 99368->99371 99380 7c8d68 58 API calls __getptd_noexit 99369->99380 99372 7c6e4e __lock_file 59 API calls 99371->99372 99374 7c5ac7 99372->99374 99373 7c5aa0 99381 7c8ff6 9 API calls wcstoxl 99373->99381 99382 7c59ee 83 API calls 5 library calls 99374->99382 99377 7c5ad6 99383 7c5af8 LeaveCriticalSection LeaveCriticalSection _fseek 99377->99383 99379 7c5aab __lseeki64 99379->99365 99380->99373 99381->99379 99382->99377 99383->99379 99387 7c582d 99384->99387 99386 7a508e 99386->99181 99388 7c5839 __lseeki64 99387->99388 99389 7c587c 99388->99389 99390 7c584f _memset 99388->99390 99391 7c5874 __lseeki64 99388->99391 99392 7c6e4e __lock_file 59 API calls 99389->99392 99414 7c8d68 58 API calls __getptd_noexit 99390->99414 99391->99386 99394 7c5882 99392->99394 99400 7c564d 99394->99400 99395 7c5869 99415 7c8ff6 9 API calls wcstoxl 99395->99415 99403 7c5668 _memset 99400->99403 99407 7c5683 99400->99407 99401 7c5673 99505 7c8d68 58 API calls __getptd_noexit 99401->99505 99403->99401 99403->99407 99408 7c56c3 99403->99408 99404 7c5678 99506 7c8ff6 9 API calls wcstoxl 99404->99506 99416 7c58b6 LeaveCriticalSection LeaveCriticalSection _fseek 99407->99416 99408->99407 99409 7c57d4 _memset 99408->99409 99410 7c4916 __fseek_nolock 58 API calls 99408->99410 99417 7d10ab 99408->99417 99485 7d0df7 99408->99485 99507 7d0f18 58 API calls 3 library calls 99408->99507 99508 7c8d68 58 API calls __getptd_noexit 99409->99508 99410->99408 99414->99395 99415->99391 99416->99391 99418 7d10cc 99417->99418 99419 7d10e3 99417->99419 99509 7c8d34 58 API calls __getptd_noexit 99418->99509 99421 7d181b 99419->99421 99426 7d111d 99419->99426 99525 7c8d34 58 API calls __getptd_noexit 99421->99525 99423 7d10d1 99510 7c8d68 58 API calls __getptd_noexit 99423->99510 99424 7d1820 99526 7c8d68 58 API calls __getptd_noexit 99424->99526 99428 7d1125 99426->99428 99433 7d113c 99426->99433 99511 7c8d34 58 API calls __getptd_noexit 99428->99511 99429 7d1131 99527 7c8ff6 9 API calls wcstoxl 99429->99527 99431 7d112a 99512 7c8d68 58 API calls __getptd_noexit 99431->99512 99434 7d1151 99433->99434 99437 7d116b 99433->99437 99438 7d1189 99433->99438 99465 7d10d8 99433->99465 99513 7c8d34 58 API calls __getptd_noexit 99434->99513 99437->99434 99442 7d1176 99437->99442 99514 7c8a5d 58 API calls 2 library calls 99438->99514 99440 7d1199 99443 7d11bc 99440->99443 99444 7d11a1 99440->99444 99441 7d5ebb __flsbuf 58 API calls 99445 7d128a 99441->99445 99442->99441 99517 7d1b11 60 API calls 3 library calls 99443->99517 99515 7c8d68 58 API calls __getptd_noexit 99444->99515 99447 7d1303 ReadFile 99445->99447 99452 7d12a0 GetConsoleMode 99445->99452 99450 7d1325 99447->99450 99451 7d17e3 GetLastError 99447->99451 99449 7d11a6 99516 7c8d34 58 API calls __getptd_noexit 99449->99516 99450->99451 99458 7d12f5 99450->99458 99454 7d12e3 99451->99454 99455 7d17f0 99451->99455 99456 7d12b4 99452->99456 99457 7d1300 99452->99457 99468 7d12e9 99454->99468 99518 7c8d47 58 API calls 3 library calls 99454->99518 99523 7c8d68 58 API calls __getptd_noexit 99455->99523 99456->99457 99460 7d12ba ReadConsoleW 99456->99460 99457->99447 99467 7d15c7 99458->99467 99458->99468 99470 7d135a 99458->99470 99460->99458 99463 7d12dd GetLastError 99460->99463 99462 7d17f5 99524 7c8d34 58 API calls __getptd_noexit 99462->99524 99463->99454 99465->99408 99466 7c2f95 _free 58 API calls 99466->99465 99467->99468 99472 7d16cd ReadFile 99467->99472 99468->99465 99468->99466 99471 7d13c6 ReadFile 99470->99471 99477 7d1447 99470->99477 99473 7d13e7 GetLastError 99471->99473 99480 7d13f1 99471->99480 99476 7d16f0 GetLastError 99472->99476 99479 7d16fe 99472->99479 99473->99480 99474 7d1504 99483 7d14b4 MultiByteToWideChar 99474->99483 99521 7d1b11 60 API calls 3 library calls 99474->99521 99475 7d14f4 99520 7c8d68 58 API calls __getptd_noexit 99475->99520 99476->99479 99477->99468 99477->99474 99477->99475 99477->99483 99479->99467 99522 7d1b11 60 API calls 3 library calls 99479->99522 99480->99470 99519 7d1b11 60 API calls 3 library calls 99480->99519 99483->99463 99483->99468 99486 7d0e17 99485->99486 99487 7d0e02 99485->99487 99491 7d0e4c 99486->99491 99496 7d0e12 99486->99496 99563 7d6234 58 API calls __malloc_crt 99486->99563 99561 7c8d68 58 API calls __getptd_noexit 99487->99561 99489 7d0e07 99562 7c8ff6 9 API calls wcstoxl 99489->99562 99493 7c4916 __fseek_nolock 58 API calls 99491->99493 99494 7d0e60 99493->99494 99528 7d0f97 99494->99528 99496->99408 99497 7d0e67 99497->99496 99498 7c4916 __fseek_nolock 58 API calls 99497->99498 99499 7d0e8a 99498->99499 99499->99496 99500 7c4916 __fseek_nolock 58 API calls 99499->99500 99501 7d0e96 99500->99501 99501->99496 99502 7c4916 __fseek_nolock 58 API calls 99501->99502 99503 7d0ea3 99502->99503 99504 7c4916 __fseek_nolock 58 API calls 99503->99504 99504->99496 99505->99404 99506->99407 99507->99408 99508->99404 99509->99423 99510->99465 99511->99431 99512->99429 99513->99431 99514->99440 99515->99449 99516->99465 99517->99442 99518->99468 99519->99480 99520->99468 99521->99483 99522->99479 99523->99462 99524->99468 99525->99424 99526->99429 99527->99465 99529 7d0fa3 __lseeki64 99528->99529 99530 7d0fc7 99529->99530 99531 7d0fb0 99529->99531 99532 7d108b 99530->99532 99534 7d0fdb 99530->99534 99533 7c8d34 __lseeki64 58 API calls 99531->99533 99535 7c8d34 __lseeki64 58 API calls 99532->99535 99536 7d0fb5 99533->99536 99537 7d0ff9 99534->99537 99538 7d1006 99534->99538 99539 7d0ffe 99535->99539 99540 7c8d68 wcstoxl 58 API calls 99536->99540 99541 7c8d34 __lseeki64 58 API calls 99537->99541 99542 7d1028 99538->99542 99543 7d1013 99538->99543 99547 7c8d68 wcstoxl 58 API calls 99539->99547 99544 7d0fbc __lseeki64 99540->99544 99541->99539 99546 7cd446 ___lock_fhandle 59 API calls 99542->99546 99545 7c8d34 __lseeki64 58 API calls 99543->99545 99544->99497 99548 7d1018 99545->99548 99549 7d102e 99546->99549 99556 7d1020 99547->99556 99550 7c8d68 wcstoxl 58 API calls 99548->99550 99551 7d1054 99549->99551 99552 7d1041 99549->99552 99550->99556 99555 7c8d68 wcstoxl 58 API calls 99551->99555 99553 7d10ab __read_nolock 70 API calls 99552->99553 99557 7d104d 99553->99557 99554 7c8ff6 wcstoxl 9 API calls 99554->99544 99558 7d1059 99555->99558 99556->99554 99560 7d1083 __read LeaveCriticalSection 99557->99560 99559 7c8d34 __lseeki64 58 API calls 99558->99559 99559->99557 99560->99544 99561->99489 99562->99496 99563->99491 99567 7c543a GetSystemTimeAsFileTime 99564->99567 99566 8091f8 99566->99183 99568 7c5468 __aulldiv 99567->99568 99568->99566 99570 7c5e9c __lseeki64 99569->99570 99571 7c5eae 99570->99571 99572 7c5ec3 99570->99572 99583 7c8d68 58 API calls __getptd_noexit 99571->99583 99573 7c6e4e __lock_file 59 API calls 99572->99573 99575 7c5ec9 99573->99575 99585 7c5b00 67 API calls 6 library calls 99575->99585 99576 7c5eb3 99584 7c8ff6 9 API calls wcstoxl 99576->99584 99579 7c5ed4 99586 7c5ef4 LeaveCriticalSection LeaveCriticalSection _fseek 99579->99586 99581 7c5ee6 99582 7c5ebe __lseeki64 99581->99582 99582->99188 99583->99576 99584->99582 99585->99579 99586->99581 99698 7a1066 99703 7af8cf 99698->99703 99700 7a106c 99701 7c2f80 __cinit 67 API calls 99700->99701 99702 7a1076 99701->99702 99704 7af8f0 99703->99704 99736 7c0143 99704->99736 99708 7af937 99709 7a77c7 59 API calls 99708->99709 99710 7af941 99709->99710 99711 7a77c7 59 API calls 99710->99711 99712 7af94b 99711->99712 99713 7a77c7 59 API calls 99712->99713 99714 7af955 99713->99714 99715 7a77c7 59 API calls 99714->99715 99716 7af993 99715->99716 99717 7a77c7 59 API calls 99716->99717 99718 7afa5e 99717->99718 99746 7b60e7 99718->99746 99722 7afa90 99723 7a77c7 59 API calls 99722->99723 99724 7afa9a 99723->99724 99774 7bffde 99724->99774 99726 7afae1 99727 7afaf1 GetStdHandle 99726->99727 99728 7afb3d 99727->99728 99729 7e49d5 99727->99729 99730 7afb45 OleInitialize 99728->99730 99729->99728 99731 7e49de 99729->99731 99730->99700 99781 806dda 64 API calls Mailbox 99731->99781 99733 7e49e5 99782 8074a9 CreateThread 99733->99782 99735 7e49f1 CloseHandle 99735->99730 99783 7c021c 99736->99783 99739 7c021c 59 API calls 99740 7c0185 99739->99740 99741 7a77c7 59 API calls 99740->99741 99742 7c0191 99741->99742 99743 7a7d2c 59 API calls 99742->99743 99744 7af8f6 99743->99744 99745 7c03a2 6 API calls 99744->99745 99745->99708 99747 7a77c7 59 API calls 99746->99747 99748 7b60f7 99747->99748 99749 7a77c7 59 API calls 99748->99749 99750 7b60ff 99749->99750 99790 7b5bfd 99750->99790 99753 7b5bfd 59 API calls 99754 7b610f 99753->99754 99755 7a77c7 59 API calls 99754->99755 99756 7b611a 99755->99756 99757 7c0ff6 Mailbox 59 API calls 99756->99757 99758 7afa68 99757->99758 99759 7b6259 99758->99759 99760 7b6267 99759->99760 99761 7a77c7 59 API calls 99760->99761 99762 7b6272 99761->99762 99763 7a77c7 59 API calls 99762->99763 99764 7b627d 99763->99764 99765 7a77c7 59 API calls 99764->99765 99766 7b6288 99765->99766 99767 7a77c7 59 API calls 99766->99767 99768 7b6293 99767->99768 99769 7b5bfd 59 API calls 99768->99769 99770 7b629e 99769->99770 99771 7c0ff6 Mailbox 59 API calls 99770->99771 99772 7b62a5 RegisterWindowMessageW 99771->99772 99772->99722 99775 7bffee 99774->99775 99776 7f5cc3 99774->99776 99778 7c0ff6 Mailbox 59 API calls 99775->99778 99793 809d71 60 API calls 99776->99793 99779 7bfff6 99778->99779 99779->99726 99780 7f5cce 99781->99733 99782->99735 99794 80748f 65 API calls 99782->99794 99784 7a77c7 59 API calls 99783->99784 99785 7c0227 99784->99785 99786 7a77c7 59 API calls 99785->99786 99787 7c022f 99786->99787 99788 7a77c7 59 API calls 99787->99788 99789 7c017b 99788->99789 99789->99739 99791 7a77c7 59 API calls 99790->99791 99792 7b5c05 99791->99792 99792->99753 99793->99780 99795 7a1016 99800 7a4ad2 99795->99800 99798 7c2f80 __cinit 67 API calls 99799 7a1025 99798->99799 99801 7c0ff6 Mailbox 59 API calls 99800->99801 99802 7a4ada 99801->99802 99803 7a101b 99802->99803 99807 7a4a94 99802->99807 99803->99798 99808 7a4a9d 99807->99808 99809 7a4aaf 99807->99809 99810 7c2f80 __cinit 67 API calls 99808->99810 99811 7a4afe 99809->99811 99810->99809 99812 7a77c7 59 API calls 99811->99812 99813 7a4b16 GetVersionExW 99812->99813 99814 7a7d2c 59 API calls 99813->99814 99815 7a4b59 99814->99815 99816 7a7e8c 59 API calls 99815->99816 99821 7a4b86 99815->99821 99817 7a4b7a 99816->99817 99818 7a7886 59 API calls 99817->99818 99818->99821 99819 7a4bf1 GetCurrentProcess IsWow64Process 99820 7a4c0a 99819->99820 99823 7a4c89 GetSystemInfo 99820->99823 99824 7a4c20 99820->99824 99821->99819 99822 7ddc8d 99821->99822 99825 7a4c56 99823->99825 99835 7a4c95 99824->99835 99825->99803 99828 7a4c7d GetSystemInfo 99830 7a4c47 99828->99830 99829 7a4c32 99831 7a4c95 2 API calls 99829->99831 99830->99825 99833 7a4c4d FreeLibrary 99830->99833 99832 7a4c3a GetNativeSystemInfo 99831->99832 99832->99830 99833->99825 99836 7a4c2e 99835->99836 99837 7a4c9e LoadLibraryA 99835->99837 99836->99828 99836->99829 99837->99836 99838 7a4caf GetProcAddress 99837->99838 99838->99836 99839 dd23b0 99853 dd0000 99839->99853 99841 dd2473 99856 dd22a0 99841->99856 99859 dd34a0 GetPEB 99853->99859 99855 dd068b 99855->99841 99857 dd22a9 Sleep 99856->99857 99858 dd22b7 99857->99858 99860 dd34ca 99859->99860 99860->99855 99861 7a1055 99866 7a2649 99861->99866 99864 7c2f80 __cinit 67 API calls 99865 7a1064 99864->99865 99867 7a77c7 59 API calls 99866->99867 99868 7a26b7 99867->99868 99873 7a3582 99868->99873 99871 7a2754 99872 7a105a 99871->99872 99876 7a3416 59 API calls 2 library calls 99871->99876 99872->99864 99877 7a35b0 99873->99877 99876->99871 99878 7a35a1 99877->99878 99879 7a35bd 99877->99879 99878->99871 99879->99878 99880 7a35c4 RegOpenKeyExW 99879->99880 99880->99878 99881 7a35de RegQueryValueExW 99880->99881 99882 7a35ff 99881->99882 99883 7a3614 RegCloseKey 99881->99883 99882->99883 99883->99878 99884 7c7e93 99885 7c7e9f __lseeki64 99884->99885 99921 7ca048 GetStartupInfoW 99885->99921 99887 7c7ea4 99923 7c8dbc GetProcessHeap 99887->99923 99889 7c7efc 99890 7c7f07 99889->99890 100006 7c7fe3 58 API calls 3 library calls 99889->100006 99924 7c9d26 99890->99924 99893 7c7f0d 99894 7c7f18 __RTC_Initialize 99893->99894 100007 7c7fe3 58 API calls 3 library calls 99893->100007 99945 7cd812 99894->99945 99897 7c7f27 99898 7c7f33 GetCommandLineW 99897->99898 100008 7c7fe3 58 API calls 3 library calls 99897->100008 99964 7d5173 GetEnvironmentStringsW 99898->99964 99902 7c7f32 99902->99898 99904 7c7f4d 99905 7c7f58 99904->99905 100009 7c32f5 58 API calls 3 library calls 99904->100009 99974 7d4fa8 99905->99974 99908 7c7f5e 99909 7c7f69 99908->99909 100010 7c32f5 58 API calls 3 library calls 99908->100010 99988 7c332f 99909->99988 99912 7c7f71 99913 7c7f7c __wwincmdln 99912->99913 100011 7c32f5 58 API calls 3 library calls 99912->100011 99994 7a492e 99913->99994 99916 7c7f90 99917 7c7f9f 99916->99917 100012 7c3598 58 API calls _doexit 99916->100012 100013 7c3320 58 API calls _doexit 99917->100013 99920 7c7fa4 __lseeki64 99922 7ca05e 99921->99922 99922->99887 99923->99889 100014 7c33c7 36 API calls 2 library calls 99924->100014 99926 7c9d2b 100015 7c9f7c InitializeCriticalSectionAndSpinCount __getstream 99926->100015 99928 7c9d30 99929 7c9d34 99928->99929 100017 7c9fca TlsAlloc 99928->100017 100016 7c9d9c 61 API calls 2 library calls 99929->100016 99932 7c9d46 99932->99929 99934 7c9d51 99932->99934 99933 7c9d39 99933->99893 100018 7c8a15 99934->100018 99937 7c9d93 100026 7c9d9c 61 API calls 2 library calls 99937->100026 99940 7c9d72 99940->99937 99942 7c9d78 99940->99942 99941 7c9d98 99941->99893 100025 7c9c73 58 API calls 4 library calls 99942->100025 99944 7c9d80 GetCurrentThreadId 99944->99893 99946 7cd81e __lseeki64 99945->99946 99947 7c9e4b __lock 58 API calls 99946->99947 99948 7cd825 99947->99948 99949 7c8a15 __calloc_crt 58 API calls 99948->99949 99950 7cd836 99949->99950 99951 7cd8a1 GetStartupInfoW 99950->99951 99952 7cd841 __lseeki64 @_EH4_CallFilterFunc@8 99950->99952 99958 7cd8b6 99951->99958 99959 7cd9e5 99951->99959 99952->99897 99953 7cdaad 100040 7cdabd LeaveCriticalSection _doexit 99953->100040 99955 7c8a15 __calloc_crt 58 API calls 99955->99958 99956 7cda32 GetStdHandle 99956->99959 99957 7cda45 GetFileType 99957->99959 99958->99955 99958->99959 99961 7cd904 99958->99961 99959->99953 99959->99956 99959->99957 100039 7ca06b InitializeCriticalSectionAndSpinCount 99959->100039 99960 7cd938 GetFileType 99960->99961 99961->99959 99961->99960 100038 7ca06b InitializeCriticalSectionAndSpinCount 99961->100038 99965 7c7f43 99964->99965 99966 7d5184 99964->99966 99970 7d4d6b GetModuleFileNameW 99965->99970 100041 7c8a5d 58 API calls 2 library calls 99966->100041 99968 7d51aa _memmove 99969 7d51c0 FreeEnvironmentStringsW 99968->99969 99969->99965 99971 7d4d9f _wparse_cmdline 99970->99971 99973 7d4ddf _wparse_cmdline 99971->99973 100042 7c8a5d 58 API calls 2 library calls 99971->100042 99973->99904 99975 7d4fb9 99974->99975 99976 7d4fc1 __wsetenvp 99974->99976 99975->99908 99977 7c8a15 __calloc_crt 58 API calls 99976->99977 99978 7d4fea __wsetenvp 99977->99978 99978->99975 99980 7c8a15 __calloc_crt 58 API calls 99978->99980 99981 7d5041 99978->99981 99982 7d5066 99978->99982 99985 7d507d 99978->99985 100043 7d4857 58 API calls wcstoxl 99978->100043 99979 7c2f95 _free 58 API calls 99979->99975 99980->99978 99981->99979 99983 7c2f95 _free 58 API calls 99982->99983 99983->99975 100044 7c9006 IsProcessorFeaturePresent 99985->100044 99987 7d5089 99987->99908 99990 7c333b __IsNonwritableInCurrentImage 99988->99990 100059 7ca711 99990->100059 99991 7c3359 __initterm_e 99992 7c2f80 __cinit 67 API calls 99991->99992 99993 7c3378 __cinit __IsNonwritableInCurrentImage 99991->99993 99992->99993 99993->99912 99995 7a4948 99994->99995 100005 7a49e7 99994->100005 99996 7a4982 IsThemeActive 99995->99996 100062 7c35ac 99996->100062 100000 7a49ae 100074 7a4a5b SystemParametersInfoW SystemParametersInfoW 100000->100074 100002 7a49ba 100075 7a3b4c 100002->100075 100005->99916 100006->99890 100007->99894 100008->99902 100012->99917 100013->99920 100014->99926 100015->99928 100016->99933 100017->99932 100021 7c8a1c 100018->100021 100020 7c8a57 100020->99937 100024 7ca026 TlsSetValue 100020->100024 100021->100020 100023 7c8a3a 100021->100023 100027 7d5446 100021->100027 100023->100020 100023->100021 100035 7ca372 Sleep 100023->100035 100024->99940 100025->99944 100026->99941 100028 7d5451 100027->100028 100032 7d546c 100027->100032 100029 7d545d 100028->100029 100028->100032 100036 7c8d68 58 API calls __getptd_noexit 100029->100036 100030 7d547c HeapAlloc 100030->100032 100033 7d5462 100030->100033 100032->100030 100032->100033 100037 7c35e1 DecodePointer 100032->100037 100033->100021 100035->100023 100036->100033 100037->100032 100038->99961 100039->99959 100040->99952 100041->99968 100042->99973 100043->99978 100045 7c9011 100044->100045 100050 7c8e99 100045->100050 100049 7c902c 100049->99987 100051 7c8eb3 _memset __call_reportfault 100050->100051 100052 7c8ed3 IsDebuggerPresent 100051->100052 100058 7ca395 SetUnhandledExceptionFilter UnhandledExceptionFilter 100052->100058 100054 7cc836 __87except 6 API calls 100056 7c8fba 100054->100056 100055 7c8f97 __call_reportfault 100055->100054 100057 7ca380 GetCurrentProcess TerminateProcess 100056->100057 100057->100049 100058->100055 100060 7ca714 EncodePointer 100059->100060 100060->100060 100061 7ca72e 100060->100061 100061->99991 100063 7c9e4b __lock 58 API calls 100062->100063 100064 7c35b7 DecodePointer EncodePointer 100063->100064 100127 7c9fb5 LeaveCriticalSection 100064->100127 100066 7a49a7 100067 7c3614 100066->100067 100068 7c361e 100067->100068 100069 7c3638 100067->100069 100068->100069 100128 7c8d68 58 API calls __getptd_noexit 100068->100128 100069->100000 100071 7c3628 100129 7c8ff6 9 API calls wcstoxl 100071->100129 100073 7c3633 100073->100000 100074->100002 100076 7a3b59 __write_nolock 100075->100076 100077 7a77c7 59 API calls 100076->100077 100078 7a3b63 GetCurrentDirectoryW 100077->100078 100130 7a3778 100078->100130 100127->100066 100128->100071 100129->100073 100131 7a77c7 59 API calls 100130->100131 100132 7a378e 100131->100132 100331 7a3d43 100132->100331 100134 7a37ac 100135 7a4864 61 API calls 100134->100135 100136 7a37c0 100135->100136 100137 7a7f41 59 API calls 100136->100137 100138 7a37cd 100137->100138 100139 7a4f3d 136 API calls 100138->100139 100140 7a37e6 100139->100140 100141 7dd3ae 100140->100141 100142 7a37ee Mailbox 100140->100142 100373 8097e5 100141->100373 100146 7a81a7 59 API calls 100142->100146 100145 7dd3cd 100148 7c2f95 _free 58 API calls 100145->100148 100149 7a3801 100146->100149 100147 7a4faa 84 API calls 100147->100145 100151 7dd3da 100148->100151 100345 7a93ea 100149->100345 100152 7a4faa 84 API calls 100151->100152 100154 7dd3e3 100152->100154 100158 7a3ee2 59 API calls 100154->100158 100155 7a7f41 59 API calls 100156 7a381a 100155->100156 100157 7a8620 69 API calls 100156->100157 100159 7a382c Mailbox 100157->100159 100160 7dd3fe 100158->100160 100161 7a7f41 59 API calls 100159->100161 100162 7a3ee2 59 API calls 100160->100162 100163 7a3852 100161->100163 100164 7dd41a 100162->100164 100165 7a8620 69 API calls 100163->100165 100166 7a4864 61 API calls 100164->100166 100168 7a3861 Mailbox 100165->100168 100167 7dd43f 100166->100167 100170 7a77c7 59 API calls 100168->100170 100173 7a387f 100170->100173 100348 7a3ee2 100173->100348 100332 7a3d50 __write_nolock 100331->100332 100333 7a7d2c 59 API calls 100332->100333 100339 7a3eb6 Mailbox 100332->100339 100335 7a3d82 100333->100335 100334 7a7b52 59 API calls 100334->100335 100335->100334 100344 7a3db8 Mailbox 100335->100344 100336 7a7b52 59 API calls 100336->100344 100337 7a3e89 100338 7a7f41 59 API calls 100337->100338 100337->100339 100341 7a3eaa 100338->100341 100339->100134 100340 7a7f41 59 API calls 100340->100344 100342 7a3f84 59 API calls 100341->100342 100342->100339 100343 7a3f84 59 API calls 100343->100344 100344->100336 100344->100337 100344->100339 100344->100340 100344->100343 100346 7c0ff6 Mailbox 59 API calls 100345->100346 100347 7a380d 100346->100347 100347->100155 100349 7a3eec 100348->100349 100374 7a5045 85 API calls 100373->100374 100375 809854 100374->100375 100376 8099be 96 API calls 100375->100376 100377 809866 100376->100377 100378 7a506b 74 API calls 100377->100378 100406 7dd3c1 100377->100406 100379 809881 100378->100379 100380 7a506b 74 API calls 100379->100380 100381 809891 100380->100381 100382 7a506b 74 API calls 100381->100382 100383 8098ac 100382->100383 100384 7a506b 74 API calls 100383->100384 100385 8098c7 100384->100385 100386 7a5045 85 API calls 100385->100386 100387 8098de 100386->100387 100388 7c594c std::exception::_Copy_str 58 API calls 100387->100388 100389 8098e5 100388->100389 100406->100145 100406->100147

                            Control-flow Graph

                            APIs
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007A3B7A
                            • IsDebuggerPresent.KERNEL32 ref: 007A3B8C
                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,008662F8,008662E0,?,?), ref: 007A3BFD
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                              • Part of subcall function 007B0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,007A3C26,008662F8,?,?,?), ref: 007B0ACE
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 007A3C81
                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,008593F0,00000010), ref: 007DD4BC
                            • SetCurrentDirectoryW.KERNEL32(?,008662F8,?,?,?), ref: 007DD4F4
                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00855D40,008662F8,?,?,?), ref: 007DD57A
                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 007DD581
                              • Part of subcall function 007A3A58: GetSysColorBrush.USER32(0000000F), ref: 007A3A62
                              • Part of subcall function 007A3A58: LoadCursorW.USER32(00000000,00007F00), ref: 007A3A71
                              • Part of subcall function 007A3A58: LoadIconW.USER32(00000063), ref: 007A3A88
                              • Part of subcall function 007A3A58: LoadIconW.USER32(000000A4), ref: 007A3A9A
                              • Part of subcall function 007A3A58: LoadIconW.USER32(000000A2), ref: 007A3AAC
                              • Part of subcall function 007A3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 007A3AD2
                              • Part of subcall function 007A3A58: RegisterClassExW.USER32(?), ref: 007A3B28
                              • Part of subcall function 007A39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007A3A15
                              • Part of subcall function 007A39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 007A3A36
                              • Part of subcall function 007A39E7: ShowWindow.USER32(00000000,?,?), ref: 007A3A4A
                              • Part of subcall function 007A39E7: ShowWindow.USER32(00000000,?,?), ref: 007A3A53
                              • Part of subcall function 007A43DB: _memset.LIBCMT ref: 007A4401
                              • Part of subcall function 007A43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007A44A6
                            Strings
                            • This is a third-party compiled AutoIt script., xrefs: 007DD4B4
                            • runas, xrefs: 007DD575
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                            • String ID: This is a third-party compiled AutoIt script.$runas
                            • API String ID: 529118366-3287110873
                            • Opcode ID: 7092277a97aad09b74de99d191c5f2d62207f3cac60751fe9653080a7e59987f
                            • Instruction ID: fd3d6f5eda7e92c8c1a73bcbce1098096a4e63e3459c50380df0c33d7c0b25e3
                            • Opcode Fuzzy Hash: 7092277a97aad09b74de99d191c5f2d62207f3cac60751fe9653080a7e59987f
                            • Instruction Fuzzy Hash: C951D630904288EACF15ABB4DC199ED7B75FB86710B004275F955A2392EA7C4A16CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 943 7a4fe9-7a5001 CreateStreamOnHGlobal 944 7a5003-7a501a FindResourceExW 943->944 945 7a5021-7a5026 943->945 946 7ddd5c-7ddd6b LoadResource 944->946 947 7a5020 944->947 946->947 948 7ddd71-7ddd7f SizeofResource 946->948 947->945 948->947 949 7ddd85-7ddd90 LockResource 948->949 949->947 950 7ddd96-7dddb4 949->950 950->947
                            APIs
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,007A4EEE,?,?,00000000,00000000), ref: 007A4FF9
                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007A4EEE,?,?,00000000,00000000), ref: 007A5010
                            • LoadResource.KERNEL32(?,00000000,?,?,007A4EEE,?,?,00000000,00000000,?,?,?,?,?,?,007A4F8F), ref: 007DDD60
                            • SizeofResource.KERNEL32(?,00000000,?,?,007A4EEE,?,?,00000000,00000000,?,?,?,?,?,?,007A4F8F), ref: 007DDD75
                            • LockResource.KERNEL32(Nz,?,?,007A4EEE,?,?,00000000,00000000,?,?,?,?,?,?,007A4F8F,00000000), ref: 007DDD88
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                            • String ID: SCRIPT$Nz
                            • API String ID: 3051347437-1391604286
                            • Opcode ID: c4a29114f2cbba6260346c347507ed38ae37ce70f02359af23a1e291d3b59f95
                            • Instruction ID: 287519ee9e049995ae94e259cf57f8079f28f4786b9e0b454ab3bb1066f609ea
                            • Opcode Fuzzy Hash: c4a29114f2cbba6260346c347507ed38ae37ce70f02359af23a1e291d3b59f95
                            • Instruction Fuzzy Hash: E2115A75200700AFD7318B65DC58F6B7BB9FBCAB11F208278F606D6260EB61EC01C660

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1007 7a4afe-7a4b5e call 7a77c7 GetVersionExW call 7a7d2c 1012 7a4c69-7a4c6b 1007->1012 1013 7a4b64 1007->1013 1014 7ddb90-7ddb9c 1012->1014 1015 7a4b67-7a4b6c 1013->1015 1016 7ddb9d-7ddba1 1014->1016 1017 7a4b72 1015->1017 1018 7a4c70-7a4c71 1015->1018 1020 7ddba4-7ddbb0 1016->1020 1021 7ddba3 1016->1021 1019 7a4b73-7a4baa call 7a7e8c call 7a7886 1017->1019 1018->1019 1029 7ddc8d-7ddc90 1019->1029 1030 7a4bb0-7a4bb1 1019->1030 1020->1016 1023 7ddbb2-7ddbb7 1020->1023 1021->1020 1023->1015 1025 7ddbbd-7ddbc4 1023->1025 1025->1014 1027 7ddbc6 1025->1027 1031 7ddbcb-7ddbce 1027->1031 1032 7ddca9-7ddcad 1029->1032 1033 7ddc92 1029->1033 1030->1031 1034 7a4bb7-7a4bc2 1030->1034 1035 7ddbd4-7ddbf2 1031->1035 1036 7a4bf1-7a4c08 GetCurrentProcess IsWow64Process 1031->1036 1037 7ddcaf-7ddcb8 1032->1037 1038 7ddc98-7ddca1 1032->1038 1041 7ddc95 1033->1041 1042 7a4bc8-7a4bca 1034->1042 1043 7ddc13-7ddc19 1034->1043 1035->1036 1044 7ddbf8-7ddbfe 1035->1044 1039 7a4c0a 1036->1039 1040 7a4c0d-7a4c1e 1036->1040 1037->1041 1051 7ddcba-7ddcbd 1037->1051 1038->1032 1039->1040 1052 7a4c89-7a4c93 GetSystemInfo 1040->1052 1053 7a4c20-7a4c30 call 7a4c95 1040->1053 1041->1038 1045 7ddc2e-7ddc3a 1042->1045 1046 7a4bd0-7a4bd3 1042->1046 1049 7ddc1b-7ddc1e 1043->1049 1050 7ddc23-7ddc29 1043->1050 1047 7ddc08-7ddc0e 1044->1047 1048 7ddc00-7ddc03 1044->1048 1057 7ddc3c-7ddc3f 1045->1057 1058 7ddc44-7ddc4a 1045->1058 1054 7a4bd9-7a4be8 1046->1054 1055 7ddc5a-7ddc5d 1046->1055 1047->1036 1048->1036 1049->1036 1050->1036 1051->1038 1056 7a4c56-7a4c66 1052->1056 1064 7a4c7d-7a4c87 GetSystemInfo 1053->1064 1065 7a4c32-7a4c3f call 7a4c95 1053->1065 1060 7ddc4f-7ddc55 1054->1060 1061 7a4bee 1054->1061 1055->1036 1063 7ddc63-7ddc78 1055->1063 1057->1036 1058->1036 1060->1036 1061->1036 1066 7ddc7a-7ddc7d 1063->1066 1067 7ddc82-7ddc88 1063->1067 1068 7a4c47-7a4c4b 1064->1068 1072 7a4c41-7a4c45 GetNativeSystemInfo 1065->1072 1073 7a4c76-7a4c7b 1065->1073 1066->1036 1067->1036 1068->1056 1071 7a4c4d-7a4c50 FreeLibrary 1068->1071 1071->1056 1072->1068 1073->1072
                            APIs
                            • GetVersionExW.KERNEL32(?), ref: 007A4B2B
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                            • GetCurrentProcess.KERNEL32(?,0082FAEC,00000000,00000000,?), ref: 007A4BF8
                            • IsWow64Process.KERNEL32(00000000), ref: 007A4BFF
                            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 007A4C45
                            • FreeLibrary.KERNEL32(00000000), ref: 007A4C50
                            • GetSystemInfo.KERNEL32(00000000), ref: 007A4C81
                            • GetSystemInfo.KERNEL32(00000000), ref: 007A4C8D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                            • String ID:
                            • API String ID: 1986165174-0
                            • Opcode ID: f246fd072a07b0dfa2b8736adbb084b6fc92f32e625352a749d62c863e7023de
                            • Instruction ID: b941be11126b5f6a4c236d1823ec6c55fcd2f43e6123068fc1d1c36cb0d37c40
                            • Opcode Fuzzy Hash: f246fd072a07b0dfa2b8736adbb084b6fc92f32e625352a749d62c863e7023de
                            • Instruction Fuzzy Hash: 5091C37154A7C0DEC731CB6885551AABFF5AFA6300F444AAED0CB93B42D269E908C729
                            APIs
                            • GetFileAttributesW.KERNELBASE(?,007DE7C1), ref: 008046A6
                            • FindFirstFileW.KERNELBASE(?,?), ref: 008046B7
                            • FindClose.KERNEL32(00000000), ref: 008046C7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FileFind$AttributesCloseFirst
                            • String ID:
                            • API String ID: 48322524-0
                            • Opcode ID: 8ffd72ce0c95e9f9235cc85891f0e202556509a0b46249e41c6b0c8ef0e3ed55
                            • Instruction ID: ea462f335267b9e1022aea2d0a7d7e18b4ed9bb95c7b9e91d5e7e6d96bb56c7a
                            • Opcode Fuzzy Hash: 8ffd72ce0c95e9f9235cc85891f0e202556509a0b46249e41c6b0c8ef0e3ed55
                            • Instruction Fuzzy Hash: 09E0D8718144009B9220A738EC4D4EA77ACFE17335F104725FA35C11E0F7B15950C595
                            Strings
                            • Variable must be of type 'Object'., xrefs: 007E428C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID: Variable must be of type 'Object'.
                            • API String ID: 0-109567571
                            • Opcode ID: 704cb9ad2ad4746e6fc8d37515a5a9a4374c9210faeb7cf92d2a14367222d334
                            • Instruction ID: 762b491d93229a8b2d151f913c4b4fbcb8f35b1be11a97ec7770c8766b91df9d
                            • Opcode Fuzzy Hash: 704cb9ad2ad4746e6fc8d37515a5a9a4374c9210faeb7cf92d2a14367222d334
                            • Instruction Fuzzy Hash: C3A2C574A04205CFCF24CF98C484AAEB7B1FF9A314F248269E916AB351D779ED41CB91
                            APIs
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007B0BBB
                            • timeGetTime.WINMM ref: 007B0E76
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007B0FB3
                            • TranslateMessage.USER32(?), ref: 007B0FC7
                            • DispatchMessageW.USER32(?), ref: 007B0FD5
                            • Sleep.KERNEL32(0000000A), ref: 007B0FDF
                            • LockWindowUpdate.USER32(00000000,?,?), ref: 007B105A
                            • DestroyWindow.USER32 ref: 007B1066
                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007B1080
                            • Sleep.KERNEL32(0000000A,?,?), ref: 007E52AD
                            • TranslateMessage.USER32(?), ref: 007E608A
                            • DispatchMessageW.USER32(?), ref: 007E6098
                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007E60AC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                            • API String ID: 4003667617-3242690629
                            • Opcode ID: 24eef53e4c99cc417b6978007047cf9bfda10e71e1fa352cd74ace94ef8ece2d
                            • Instruction ID: 87d6fc0bc45572a7a4d2ddfb7e718fdec6488e07acd3a9dd81a2a59b868dcdb5
                            • Opcode Fuzzy Hash: 24eef53e4c99cc417b6978007047cf9bfda10e71e1fa352cd74ace94ef8ece2d
                            • Instruction Fuzzy Hash: 47B2F670609785DFD724DF24C888BAAB7E5FF89308F144A1DF549872A1DB78E844CB92

                            Control-flow Graph

                            APIs
                              • Part of subcall function 008091E9: __time64.LIBCMT ref: 008091F3
                              • Part of subcall function 007A5045: _fseek.LIBCMT ref: 007A505D
                            • __wsplitpath.LIBCMT ref: 008094BE
                              • Part of subcall function 007C432E: __wsplitpath_helper.LIBCMT ref: 007C436E
                            • _wcscpy.LIBCMT ref: 008094D1
                            • _wcscat.LIBCMT ref: 008094E4
                            • __wsplitpath.LIBCMT ref: 00809509
                            • _wcscat.LIBCMT ref: 0080951F
                            • _wcscat.LIBCMT ref: 00809532
                              • Part of subcall function 0080922F: _memmove.LIBCMT ref: 00809268
                              • Part of subcall function 0080922F: _memmove.LIBCMT ref: 00809277
                            • _wcscmp.LIBCMT ref: 00809479
                              • Part of subcall function 008099BE: _wcscmp.LIBCMT ref: 00809AAE
                              • Part of subcall function 008099BE: _wcscmp.LIBCMT ref: 00809AC1
                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 008096DC
                            • _wcsncpy.LIBCMT ref: 0080974F
                            • DeleteFileW.KERNEL32(?,?), ref: 00809785
                            • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0080979B
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008097AC
                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008097BE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                            • String ID:
                            • API String ID: 1500180987-0
                            • Opcode ID: 60829efb69df5e271e2fca735b3e6a37bda59beab741bbcab77dd9987363d220
                            • Instruction ID: bff17aa34d440b77cc65ccd0299e988003f8ebafe293f305a3c2b327ad1aeda3
                            • Opcode Fuzzy Hash: 60829efb69df5e271e2fca735b3e6a37bda59beab741bbcab77dd9987363d220
                            • Instruction Fuzzy Hash: D7C14CB1E00219AACF21DFA4CC85EDEB7BDFF55300F0041AAF649E6192DB749A448F65

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 007A3074
                            • RegisterClassExW.USER32(00000030), ref: 007A309E
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007A30AF
                            • InitCommonControlsEx.COMCTL32(?), ref: 007A30CC
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007A30DC
                            • LoadIconW.USER32(000000A9), ref: 007A30F2
                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007A3101
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: e5a338729304a0319f03ab43413c1c07cc7e298042b830ae6adfbd42edfb45b0
                            • Instruction ID: 9aefb64debce436f867849ed293b661ea4d185904fb09503fa99f07802041922
                            • Opcode Fuzzy Hash: e5a338729304a0319f03ab43413c1c07cc7e298042b830ae6adfbd42edfb45b0
                            • Instruction Fuzzy Hash: B83129B1800389AFDB518FA4EC44AD9BBF0FB09310F14812AE650E62A1E3B54591CF91

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 007A3074
                            • RegisterClassExW.USER32(00000030), ref: 007A309E
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007A30AF
                            • InitCommonControlsEx.COMCTL32(?), ref: 007A30CC
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007A30DC
                            • LoadIconW.USER32(000000A9), ref: 007A30F2
                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007A3101
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: 23999ff770f6349f3aa26591da184064889f8026752203981135d788e856971b
                            • Instruction ID: 362b38de016e31b63a6136e636964129ae589f83888db1baec7b324502f30afb
                            • Opcode Fuzzy Hash: 23999ff770f6349f3aa26591da184064889f8026752203981135d788e856971b
                            • Instruction Fuzzy Hash: 9521E0B1900258AFDB10DFA4E988B9DBBF4FB08700F00913AFA10E72A1E7B54555CF91

                            Control-flow Graph

                            APIs
                              • Part of subcall function 007A4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,008662F8,?,007A37C0,?), ref: 007A4882
                              • Part of subcall function 007C074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,007A72C5), ref: 007C0771
                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 007A7308
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007DECF1
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007DED32
                            • RegCloseKey.ADVAPI32(?), ref: 007DED70
                            • _wcscat.LIBCMT ref: 007DEDC9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                            • API String ID: 2673923337-2727554177
                            • Opcode ID: ba89379083c518cb20e109192cd80743b32fdf916a22df08a9c62c6417d235df
                            • Instruction ID: b4b72cede70f9ec56d9f21e7afb0071a70cb23c140cf0b87c9f9e8aa0fc70562
                            • Opcode Fuzzy Hash: ba89379083c518cb20e109192cd80743b32fdf916a22df08a9c62c6417d235df
                            • Instruction Fuzzy Hash: D471AB71108301DEC314EF25EC9599BBBF8FF85704B41062EF546C72A1EBB49949CBA2

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 007A3A62
                            • LoadCursorW.USER32(00000000,00007F00), ref: 007A3A71
                            • LoadIconW.USER32(00000063), ref: 007A3A88
                            • LoadIconW.USER32(000000A4), ref: 007A3A9A
                            • LoadIconW.USER32(000000A2), ref: 007A3AAC
                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 007A3AD2
                            • RegisterClassExW.USER32(?), ref: 007A3B28
                              • Part of subcall function 007A3041: GetSysColorBrush.USER32(0000000F), ref: 007A3074
                              • Part of subcall function 007A3041: RegisterClassExW.USER32(00000030), ref: 007A309E
                              • Part of subcall function 007A3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007A30AF
                              • Part of subcall function 007A3041: InitCommonControlsEx.COMCTL32(?), ref: 007A30CC
                              • Part of subcall function 007A3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007A30DC
                              • Part of subcall function 007A3041: LoadIconW.USER32(000000A9), ref: 007A30F2
                              • Part of subcall function 007A3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007A3101
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                            • String ID: #$0$AutoIt v3
                            • API String ID: 423443420-4155596026
                            • Opcode ID: d9d6a2392884ef544f3f2a1b547687842abfc238ef678d7fd4822090d984e34c
                            • Instruction ID: 39adfc7922c634810809634fd13ad87071adbd2f9f725d7e6a11f3f590ca1242
                            • Opcode Fuzzy Hash: d9d6a2392884ef544f3f2a1b547687842abfc238ef678d7fd4822090d984e34c
                            • Instruction Fuzzy Hash: 60213971900344AFEB109FA4EC19B9D7FB5FB08710F01512AF604A63A1E3FA5664CF84

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 768 7a3633-7a3681 770 7a3683-7a3686 768->770 771 7a36e1-7a36e3 768->771 772 7a3688-7a368f 770->772 773 7a36e7 770->773 771->770 774 7a36e5 771->774 775 7a375d-7a3765 PostQuitMessage 772->775 776 7a3695-7a369a 772->776 778 7dd31c-7dd34a call 7b11d0 call 7b11f3 773->778 779 7a36ed-7a36f0 773->779 777 7a36ca-7a36d2 DefWindowProcW 774->777 784 7a3711-7a3713 775->784 780 7dd38f-7dd3a3 call 802a16 776->780 781 7a36a0-7a36a2 776->781 783 7a36d8-7a36de 777->783 814 7dd34f-7dd356 778->814 785 7a36f2-7a36f3 779->785 786 7a3715-7a373c SetTimer RegisterWindowMessageW 779->786 780->784 806 7dd3a9 780->806 787 7a36a8-7a36ad 781->787 788 7a3767-7a3776 call 7a4531 781->788 784->783 792 7dd2bf-7dd2c2 785->792 793 7a36f9-7a370c KillTimer call 7a44cb call 7a3114 785->793 786->784 789 7a373e-7a3749 CreatePopupMenu 786->789 794 7dd374-7dd37b 787->794 795 7a36b3-7a36b8 787->795 788->784 789->784 799 7dd2f8-7dd317 MoveWindow 792->799 800 7dd2c4-7dd2c6 792->800 793->784 794->777 803 7dd381-7dd38a call 7f817e 794->803 804 7a374b-7a375b call 7a45df 795->804 805 7a36be-7a36c4 795->805 799->784 809 7dd2c8-7dd2cb 800->809 810 7dd2e7-7dd2f3 SetFocus 800->810 803->777 804->784 805->777 805->814 806->777 809->805 815 7dd2d1-7dd2e2 call 7b11d0 809->815 810->784 814->777 819 7dd35c-7dd36f call 7a44cb call 7a43db 814->819 815->784 819->777
                            APIs
                            • DefWindowProcW.USER32(?,?,?,?), ref: 007A36D2
                            • KillTimer.USER32(?,00000001), ref: 007A36FC
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007A371F
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007A372A
                            • CreatePopupMenu.USER32 ref: 007A373E
                            • PostQuitMessage.USER32(00000000), ref: 007A375F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                            • String ID: TaskbarCreated
                            • API String ID: 129472671-2362178303
                            • Opcode ID: 3f36eb2da2381726cf2fc6099f563ae2886f82539262f94e8e839712438c980c
                            • Instruction ID: e656f7e157ebbda7ac205bc5234205dcedba93860027b7090330b9939285d6a6
                            • Opcode Fuzzy Hash: 3f36eb2da2381726cf2fc6099f563ae2886f82539262f94e8e839712438c980c
                            • Instruction Fuzzy Hash: 3441F9B1200189FBDB245F78DC4DB793765FB86300F140339F602D63A2DAAD9D6597A1

                            Control-flow Graph

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                            • API String ID: 1825951767-3513169116
                            • Opcode ID: cd8a3862d8e9342ce73ad281d15180073d3213bd86196eaf5e48e7a573b3dcbf
                            • Instruction ID: e3523b0283172e763743caa0e60430476030b8657b7a27047d199751f1ea6e96
                            • Opcode Fuzzy Hash: cd8a3862d8e9342ce73ad281d15180073d3213bd86196eaf5e48e7a573b3dcbf
                            • Instruction Fuzzy Hash: 4CA15371D1026DEACB04EF90DC99DEEB778BF95300F140229F516A7191EF785A09CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 953 dd25f0-dd269e call dd0000 956 dd26a5-dd26cb call dd3500 CreateFileW 953->956 959 dd26cd 956->959 960 dd26d2-dd26e2 956->960 961 dd281d-dd2821 959->961 967 dd26e9-dd2703 VirtualAlloc 960->967 968 dd26e4 960->968 962 dd2863-dd2866 961->962 963 dd2823-dd2827 961->963 969 dd2869-dd2870 962->969 965 dd2829-dd282c 963->965 966 dd2833-dd2837 963->966 965->966 970 dd2839-dd2843 966->970 971 dd2847-dd284b 966->971 972 dd270a-dd2721 ReadFile 967->972 973 dd2705 967->973 968->961 974 dd28c5-dd28da 969->974 975 dd2872-dd287d 969->975 970->971 980 dd284d-dd2857 971->980 981 dd285b 971->981 982 dd2728-dd2768 VirtualAlloc 972->982 983 dd2723 972->983 973->961 978 dd28dc-dd28e7 VirtualFree 974->978 979 dd28ea-dd28f2 974->979 976 dd287f 975->976 977 dd2881-dd288d 975->977 976->974 984 dd288f-dd289f 977->984 985 dd28a1-dd28ad 977->985 978->979 980->981 981->962 986 dd276f-dd278a call dd3750 982->986 987 dd276a 982->987 983->961 989 dd28c3 984->989 990 dd28af-dd28b8 985->990 991 dd28ba-dd28c0 985->991 993 dd2795-dd279f 986->993 987->961 989->969 990->989 991->989 994 dd27a1-dd27d0 call dd3750 993->994 995 dd27d2-dd27e6 call dd3560 993->995 994->993 1001 dd27e8 995->1001 1002 dd27ea-dd27ee 995->1002 1001->961 1003 dd27fa-dd27fe 1002->1003 1004 dd27f0-dd27f4 FindCloseChangeNotification 1002->1004 1005 dd280e-dd2817 1003->1005 1006 dd2800-dd280b VirtualFree 1003->1006 1004->1003 1005->956 1005->961 1006->1005
                            APIs
                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00DD26C1
                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00DD28E7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateFileFreeVirtual
                            • String ID:
                            • API String ID: 204039940-0
                            • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                            • Instruction ID: 452efee81bcf3fc8e485d37fadcd2adce4d41efa1a8b4eb102b9db6520476cd1
                            • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                            • Instruction Fuzzy Hash: 21A11474E00209EBDB14CFA4C895BAEBBB5FF58304F24855AE501BB380D7759A81DFA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1074 7a39e7-7a3a57 CreateWindowExW * 2 ShowWindow * 2
                            APIs
                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007A3A15
                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 007A3A36
                            • ShowWindow.USER32(00000000,?,?), ref: 007A3A4A
                            • ShowWindow.USER32(00000000,?,?), ref: 007A3A53
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$CreateShow
                            • String ID: AutoIt v3$edit
                            • API String ID: 1584632944-3779509399
                            • Opcode ID: acfc0262f3658e0a80055b630654c628f9346809638d67b2e1e5f65cdbe54b4e
                            • Instruction ID: 61c9a371a728a284dc0ccee9f19bd0ac21a8a598ef82699422a35895a9ebbe82
                            • Opcode Fuzzy Hash: acfc0262f3658e0a80055b630654c628f9346809638d67b2e1e5f65cdbe54b4e
                            • Instruction Fuzzy Hash: CFF03A706002E07EEB3017236C19E273E7DF7C6F60F02503AFA00A2271D2E50861DAB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1075 dd23b0-dd24e9 call dd0000 call dd22a0 CreateFileW 1082 dd24eb 1075->1082 1083 dd24f0-dd2500 1075->1083 1084 dd25a0-dd25a5 1082->1084 1086 dd2507-dd2521 VirtualAlloc 1083->1086 1087 dd2502 1083->1087 1088 dd2525-dd253c ReadFile 1086->1088 1089 dd2523 1086->1089 1087->1084 1090 dd253e 1088->1090 1091 dd2540-dd257a call dd22e0 call dd12a0 1088->1091 1089->1084 1090->1084 1096 dd257c-dd2591 call dd2330 1091->1096 1097 dd2596-dd259e ExitProcess 1091->1097 1096->1097 1097->1084
                            APIs
                              • Part of subcall function 00DD22A0: Sleep.KERNELBASE(000001F4), ref: 00DD22B1
                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00DD24DF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateFileSleep
                            • String ID: GYBW1JTI8A8BY2YHMQN9C892
                            • API String ID: 2694422964-2611261086
                            • Opcode ID: 44827e7afa1045018322a829356671fedd5dcf079145925902e8722ee6fd78c1
                            • Instruction ID: 78cd9d76108f3dbef7ced293b6fdc9611fdb426c9dbc93a3e9325e44423d97f5
                            • Opcode Fuzzy Hash: 44827e7afa1045018322a829356671fedd5dcf079145925902e8722ee6fd78c1
                            • Instruction Fuzzy Hash: 7451B630D04289EAEF11D7E4D815BEEBBB8AF15304F14419AE648BB2C1D7B91B48CB75

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1099 7a410d-7a4123 1100 7a4129-7a413e call 7a7b76 1099->1100 1101 7a4200-7a4204 1099->1101 1104 7dd5dd-7dd5ec LoadStringW 1100->1104 1105 7a4144-7a4164 call 7a7d2c 1100->1105 1108 7dd5f7-7dd60f call 7a7c8e call 7a7143 1104->1108 1105->1108 1109 7a416a-7a416e 1105->1109 1118 7a417e-7a41fb call 7c3020 call 7a463e call 7c2ffc Shell_NotifyIconW call 7a5a64 1108->1118 1121 7dd615-7dd633 call 7a7e0b call 7a7143 call 7a7e0b 1108->1121 1111 7a4174-7a4179 call 7a7c8e 1109->1111 1112 7a4205-7a420e call 7a81a7 1109->1112 1111->1118 1112->1118 1118->1101 1121->1118
                            APIs
                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007DD5EC
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                            • _memset.LIBCMT ref: 007A418D
                            • _wcscpy.LIBCMT ref: 007A41E1
                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007A41F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                            • String ID: Line:
                            • API String ID: 3942752672-1585850449
                            • Opcode ID: 831993e60a7c38823b0b56cceaead90626f20b9e9025dee08c4616554088117d
                            • Instruction ID: f8b2180afbf9313f6531a06a40ce8edc647cf143bdfe089a81dd058aa719f213
                            • Opcode Fuzzy Hash: 831993e60a7c38823b0b56cceaead90626f20b9e9025dee08c4616554088117d
                            • Instruction Fuzzy Hash: EB31C471008344AAD325EB60DC5AFDB77ECBFC5300F10461EF19592191EBB8AA59CB92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1134 7c564d-7c5666 1135 7c5668-7c566d 1134->1135 1136 7c5683 1134->1136 1135->1136 1137 7c566f-7c5671 1135->1137 1138 7c5685-7c568b 1136->1138 1139 7c568c-7c5691 1137->1139 1140 7c5673-7c5678 call 7c8d68 1137->1140 1142 7c569f-7c56a3 1139->1142 1143 7c5693-7c569d 1139->1143 1151 7c567e call 7c8ff6 1140->1151 1146 7c56a5-7c56b0 call 7c3020 1142->1146 1147 7c56b3-7c56b5 1142->1147 1143->1142 1145 7c56c3-7c56d2 1143->1145 1149 7c56d9 1145->1149 1150 7c56d4-7c56d7 1145->1150 1146->1147 1147->1140 1148 7c56b7-7c56c1 1147->1148 1148->1140 1148->1145 1154 7c56de-7c56e3 1149->1154 1150->1154 1151->1136 1156 7c57cc-7c57cf 1154->1156 1157 7c56e9-7c56f0 1154->1157 1156->1138 1158 7c5731-7c5733 1157->1158 1159 7c56f2-7c56fa 1157->1159 1160 7c579d-7c579e call 7d0df7 1158->1160 1161 7c5735-7c5737 1158->1161 1159->1158 1162 7c56fc 1159->1162 1169 7c57a3-7c57a7 1160->1169 1164 7c5739-7c5741 1161->1164 1165 7c575b-7c5766 1161->1165 1166 7c57fa 1162->1166 1167 7c5702-7c5704 1162->1167 1170 7c5751-7c5755 1164->1170 1171 7c5743-7c574f 1164->1171 1172 7c5768 1165->1172 1173 7c576a-7c576d 1165->1173 1168 7c57fe-7c5807 1166->1168 1174 7c570b-7c5710 1167->1174 1175 7c5706-7c5708 1167->1175 1168->1138 1169->1168 1176 7c57a9-7c57ae 1169->1176 1177 7c5757-7c5759 1170->1177 1171->1177 1172->1173 1178 7c576f-7c577b call 7c4916 call 7d10ab 1173->1178 1179 7c57d4-7c57d8 1173->1179 1174->1179 1180 7c5716-7c572f call 7d0f18 1174->1180 1175->1174 1176->1179 1181 7c57b0-7c57c1 1176->1181 1177->1173 1195 7c5780-7c5785 1178->1195 1182 7c57ea-7c57f5 call 7c8d68 1179->1182 1183 7c57da-7c57e7 call 7c3020 1179->1183 1191 7c5792-7c579b 1180->1191 1186 7c57c4-7c57c6 1181->1186 1182->1151 1183->1182 1186->1156 1186->1157 1191->1186 1196 7c580c-7c5810 1195->1196 1197 7c578b-7c578e 1195->1197 1196->1168 1197->1166 1198 7c5790 1197->1198 1198->1191
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                            • String ID:
                            • API String ID: 1559183368-0
                            • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                            • Instruction ID: 7388daeebf1167d13a155a89882453d301aa3985119d564e805eaba757852a49
                            • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                            • Instruction Fuzzy Hash: DD518030A00B05DBDB249FA98884F6E77B5AF50720F64872DE825962D1D77AADD08B50
                            APIs
                              • Part of subcall function 007A4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,008662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 007A4F6F
                            • _free.LIBCMT ref: 007DE68C
                            • _free.LIBCMT ref: 007DE6D3
                              • Part of subcall function 007A6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 007A6D0D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _free$CurrentDirectoryLibraryLoad
                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                            • API String ID: 2861923089-1757145024
                            • Opcode ID: e8c9a0bd358bdaa34631b7ced7b3c82a1372a6fa9cd00e40e971911c61c75edf
                            • Instruction ID: f0dc3c97cf8444e84eb4011f43f3c848f8e85df6973d6435354a3c47de1716a5
                            • Opcode Fuzzy Hash: e8c9a0bd358bdaa34631b7ced7b3c82a1372a6fa9cd00e40e971911c61c75edf
                            • Instruction Fuzzy Hash: 21918D71910219EFCF05EFA4CC859EDBBB4FF59314F14452AF816AB291EB38A905CB60
                            APIs
                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,007A35A1,SwapMouseButtons,00000004,?), ref: 007A35D4
                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,007A35A1,SwapMouseButtons,00000004,?,?,?,?,007A2754), ref: 007A35F5
                            • RegCloseKey.KERNELBASE(00000000,?,?,007A35A1,SwapMouseButtons,00000004,?,?,?,?,007A2754), ref: 007A3617
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: Control Panel\Mouse
                            • API String ID: 3677997916-824357125
                            • Opcode ID: b612265a1855d89f494fc007f22b1b8d430243d3cf50c9d74f54d3881d45aaf6
                            • Instruction ID: 3a9194ffbdc5e1cab6f97b27b079ccbd8c2fbb096f93eefd8ad0a5b58d8f248a
                            • Opcode Fuzzy Hash: b612265a1855d89f494fc007f22b1b8d430243d3cf50c9d74f54d3881d45aaf6
                            • Instruction Fuzzy Hash: 69114871910208BFDB208FA4DC40DAFB7B8EF45740F00866AF905D7210E2719E419B60
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00DD1ACD
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00DD1AF1
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00DD1B13
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                            • Instruction ID: ade2d5b766fa3bdeac31d27a41c216e2593aea79aee019ff14c4fb1a588d4bc2
                            • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                            • Instruction Fuzzy Hash: DB621C34A14658DBEB24CFA4C850BDEB376EF58300F1091A9E10DEB394E7759E81CB69
                            APIs
                              • Part of subcall function 007A5045: _fseek.LIBCMT ref: 007A505D
                              • Part of subcall function 008099BE: _wcscmp.LIBCMT ref: 00809AAE
                              • Part of subcall function 008099BE: _wcscmp.LIBCMT ref: 00809AC1
                            • _free.LIBCMT ref: 0080992C
                            • _free.LIBCMT ref: 00809933
                            • _free.LIBCMT ref: 0080999E
                              • Part of subcall function 007C2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,007C9C64), ref: 007C2FA9
                              • Part of subcall function 007C2F95: GetLastError.KERNEL32(00000000,?,007C9C64), ref: 007C2FBB
                            • _free.LIBCMT ref: 008099A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                            • String ID:
                            • API String ID: 1552873950-0
                            • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                            • Instruction ID: 254fe2d571c497247f002b0a3e0cbf13b4ebabd5ba8f6f194aaed9b8e9ad23f0
                            • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                            • Instruction Fuzzy Hash: F9516FB1904218EFDF249F64CC45A9EBB79FF48310F1005AEF649A7282DB755A80CF59
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                            • String ID:
                            • API String ID: 2782032738-0
                            • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                            • Instruction ID: 2d84e9504b6dfbfb60076614d0850ea5f4898726e31cabd2d89032c44cf68ebe
                            • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                            • Instruction Fuzzy Hash: 8D41D671A00615ABDF28CE69C8A4FAF77A5EF80360B24C13DE855C7640D778ED408B44
                            APIs
                            • _memset.LIBCMT ref: 007DEE62
                            • GetOpenFileNameW.COMDLG32(?), ref: 007DEEAC
                              • Part of subcall function 007A48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007A48A1,?,?,007A37C0,?), ref: 007A48CE
                              • Part of subcall function 007C09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007C09F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Name$Path$FileFullLongOpen_memset
                            • String ID: X
                            • API String ID: 3777226403-3081909835
                            • Opcode ID: 47e60baf86dd0baba9d64bad0fe8f67639b939a3452954ad8002f62a5bc4a6ea
                            • Instruction ID: 57cff368f9c04a7c5fe89cfc00f16ce287d54ce2ae3d234d8ec1137e83804373
                            • Opcode Fuzzy Hash: 47e60baf86dd0baba9d64bad0fe8f67639b939a3452954ad8002f62a5bc4a6ea
                            • Instruction Fuzzy Hash: E621A471A00298DBDB159F94CC49BEE7BF8AF89301F00801AE508EB241DBBC598DCF91
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __fread_nolock_memmove
                            • String ID: EA06
                            • API String ID: 1988441806-3962188686
                            • Opcode ID: fc35b1adbf94f8d28942acccbd43cc0d3ae3c1cb853dc94cdf9d5e3daebdbad0
                            • Instruction ID: 6434b10224680457617d6cb6c5e6db2fb6240b4834ec4201960544eeb45502a0
                            • Opcode Fuzzy Hash: fc35b1adbf94f8d28942acccbd43cc0d3ae3c1cb853dc94cdf9d5e3daebdbad0
                            • Instruction Fuzzy Hash: 1801B972904658AEDB28C6A8CC5AFFE7BF8DB15301F00419EF592D2181E579E6488760
                            APIs
                            • GetTempPathW.KERNEL32(00000104,?), ref: 00809B82
                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00809B99
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Temp$FileNamePath
                            • String ID: aut
                            • API String ID: 3285503233-3010740371
                            • Opcode ID: e539992b6af73617210b5fa4af890c0b4febe551edbcd95fda5acabd221a3b73
                            • Instruction ID: bc2e7b2b09222dde2711b64d90205c43dfbecc883e92c00a99104700d5e16a7d
                            • Opcode Fuzzy Hash: e539992b6af73617210b5fa4af890c0b4febe551edbcd95fda5acabd221a3b73
                            • Instruction Fuzzy Hash: C3D05E7954030DABDB209B90DC4EF9A773CF704701F0082B1BF64D11A2DEB45599CBA5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d11b7ab11dddad256f0dbeea7cef6fb1b58505fc71dd59e473562d8447eb3eb7
                            • Instruction ID: 113b8d80415c33ca3a81af6b56f11bb5c5e06f67a5eb3fe8ec8f62adf547d2d0
                            • Opcode Fuzzy Hash: d11b7ab11dddad256f0dbeea7cef6fb1b58505fc71dd59e473562d8447eb3eb7
                            • Instruction Fuzzy Hash: 89F13670608705DFC714DF28C484AAABBE9FF89314F14892EF8999B251D774E985CF82
                            APIs
                              • Part of subcall function 007C03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007C03D3
                              • Part of subcall function 007C03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 007C03DB
                              • Part of subcall function 007C03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007C03E6
                              • Part of subcall function 007C03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007C03F1
                              • Part of subcall function 007C03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 007C03F9
                              • Part of subcall function 007C03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 007C0401
                              • Part of subcall function 007B6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,007AFA90), ref: 007B62B4
                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 007AFB2D
                            • OleInitialize.OLE32(00000000), ref: 007AFBAA
                            • CloseHandle.KERNEL32(00000000), ref: 007E49F2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                            • String ID:
                            • API String ID: 1986988660-0
                            • Opcode ID: ae277b8f5291a6bceedd2f941ca13b018a00058e7899bbeb58103ca2510bfd6d
                            • Instruction ID: 6c5868315abefccdc6c6d28f1844e57bb66757b7ff6807f4734fe09379442552
                            • Opcode Fuzzy Hash: ae277b8f5291a6bceedd2f941ca13b018a00058e7899bbeb58103ca2510bfd6d
                            • Instruction Fuzzy Hash: 7B81BCB09012C0DEC784DF69AD496157BE4FB98314B12A23AD219C7362FFB54429CF98
                            APIs
                            • _memset.LIBCMT ref: 007A4401
                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007A44A6
                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007A44C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: IconNotifyShell_$_memset
                            • String ID:
                            • API String ID: 1505330794-0
                            • Opcode ID: 9fba7fda9dee4cc6d4fcf9fb1e699f84a448b2541a36b36a6827b39a4af1f8c1
                            • Instruction ID: 0b09413f671ec0f20411c9265dc09a8d08771b4c9b833ed2133712f2f51db63e
                            • Opcode Fuzzy Hash: 9fba7fda9dee4cc6d4fcf9fb1e699f84a448b2541a36b36a6827b39a4af1f8c1
                            • Instruction Fuzzy Hash: 423182B05043419FD720DF24D884797BBF8FB89305F000A2EE59A83241E7B66944CB52
                            APIs
                            • __FF_MSGBANNER.LIBCMT ref: 007C5963
                              • Part of subcall function 007CA3AB: __NMSG_WRITE.LIBCMT ref: 007CA3D2
                              • Part of subcall function 007CA3AB: __NMSG_WRITE.LIBCMT ref: 007CA3DC
                            • __NMSG_WRITE.LIBCMT ref: 007C596A
                              • Part of subcall function 007CA408: GetModuleFileNameW.KERNEL32(00000000,008643BA,00000104,?,00000001,00000000), ref: 007CA49A
                              • Part of subcall function 007CA408: ___crtMessageBoxW.LIBCMT ref: 007CA548
                              • Part of subcall function 007C32DF: ___crtCorExitProcess.LIBCMT ref: 007C32E5
                              • Part of subcall function 007C32DF: ExitProcess.KERNEL32 ref: 007C32EE
                              • Part of subcall function 007C8D68: __getptd_noexit.LIBCMT ref: 007C8D68
                            • RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,007C1013,?), ref: 007C598F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                            • String ID:
                            • API String ID: 1372826849-0
                            • Opcode ID: 8e4ff2ec8847134e638848a612f1f67123fae52ba064f52aff7486a8d01514c1
                            • Instruction ID: 69fb8eae92cbc4000e31588293bbd8a10362ece46ac1fc6f6d3e1dc058bc366c
                            • Opcode Fuzzy Hash: 8e4ff2ec8847134e638848a612f1f67123fae52ba064f52aff7486a8d01514c1
                            • Instruction Fuzzy Hash: D301D231300A15EEE6212B74E85AF2E73589F52B30F11016EF4019A282DEBEBD818761
                            APIs
                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,008097D2,?,?,?,?,?,00000004), ref: 00809B45
                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,008097D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00809B5B
                            • CloseHandle.KERNEL32(00000000,?,008097D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00809B62
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: File$CloseCreateHandleTime
                            • String ID:
                            • API String ID: 3397143404-0
                            • Opcode ID: 6c64e6c63c53b7c763af3e247d0e9d941e033849944080a2c95502d0d96d831b
                            • Instruction ID: 54ed21fb4df5b1cddc887aada37c0582d9bebbde91fc098ca7f9812ed4972f57
                            • Opcode Fuzzy Hash: 6c64e6c63c53b7c763af3e247d0e9d941e033849944080a2c95502d0d96d831b
                            • Instruction Fuzzy Hash: 8EE08632180324B7D7321B54EC0AFCA7B28FB05771F108230FB54A90E187B12522D798
                            APIs
                            • _free.LIBCMT ref: 00808FA5
                              • Part of subcall function 007C2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,007C9C64), ref: 007C2FA9
                              • Part of subcall function 007C2F95: GetLastError.KERNEL32(00000000,?,007C9C64), ref: 007C2FBB
                            • _free.LIBCMT ref: 00808FB6
                            • _free.LIBCMT ref: 00808FC8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                            • Instruction ID: 8fa6e3bd22656905cff1a93b19d406c5ad055b302538365dbb0572ea8bd62e1b
                            • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                            • Instruction Fuzzy Hash: 23E012A1609706CADA64B578AD44F9357EEAF48360728081DB449DB183DE28E8828124
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID: CALL
                            • API String ID: 0-4196123274
                            • Opcode ID: f7470d3de1f33d9ec81faf14e8b26c1237a60246fc2b6af862c4a61b232f82ea
                            • Instruction ID: fa07de9bbe8df76cba520e78eac7a0866e6f710f151dc66db924a9b18019869a
                            • Opcode Fuzzy Hash: f7470d3de1f33d9ec81faf14e8b26c1237a60246fc2b6af862c4a61b232f82ea
                            • Instruction Fuzzy Hash: CD223A70608241DFC724DF14C494B6ABBE1FF8A304F158A5DE8968B362D779ED85CB82
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: EA06
                            • API String ID: 4104443479-3962188686
                            • Opcode ID: cf05ddf237ff965952a754b080c4a8c606e210a22d4e395247837a14e025edc8
                            • Instruction ID: 09d0525378ab75fff607cf4c3e82f92920dcb224c7af50caa673994b7d1a9e4b
                            • Opcode Fuzzy Hash: cf05ddf237ff965952a754b080c4a8c606e210a22d4e395247837a14e025edc8
                            • Instruction Fuzzy Hash: 13416C71A08154DBDF215B648C557BF7FA6ABC3300F684265E8829A282C6EE8D4087E1
                            APIs
                            • IsThemeActive.UXTHEME ref: 007A4992
                              • Part of subcall function 007C35AC: __lock.LIBCMT ref: 007C35B2
                              • Part of subcall function 007C35AC: DecodePointer.KERNEL32(00000001,?,007A49A7,007F81BC), ref: 007C35BE
                              • Part of subcall function 007C35AC: EncodePointer.KERNEL32(?,?,007A49A7,007F81BC), ref: 007C35C9
                              • Part of subcall function 007A4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 007A4A73
                              • Part of subcall function 007A4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 007A4A88
                              • Part of subcall function 007A3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007A3B7A
                              • Part of subcall function 007A3B4C: IsDebuggerPresent.KERNEL32 ref: 007A3B8C
                              • Part of subcall function 007A3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,008662F8,008662E0,?,?), ref: 007A3BFD
                              • Part of subcall function 007A3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 007A3C81
                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 007A49D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                            • String ID:
                            • API String ID: 1438897964-0
                            • Opcode ID: 378c20983567e4bc7d8c35f4b85162a8dd7083d10b34c793e1025cb390ef1632
                            • Instruction ID: 70b8de67d83b8574ecdd59dc090cdbee099c0e3ea11469c2dcc0e61a1e90cafa
                            • Opcode Fuzzy Hash: 378c20983567e4bc7d8c35f4b85162a8dd7083d10b34c793e1025cb390ef1632
                            • Instruction Fuzzy Hash: 53116A719083519BC300EF28E80994ABFF8FBD5710F01862EF155932B1EBB59565CB96
                            APIs
                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,007A5981,?,?,?,?), ref: 007A5E27
                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,007A5981,?,?,?,?), ref: 007DE19C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateFile
                            • String ID:
                            • API String ID: 823142352-0
                            • Opcode ID: 5f9cc0d70e98db1396f03c15632ad39bdb3414b7ea4022c41cc645a6f601d2bb
                            • Instruction ID: 3bf12346d64fa0a57e1d8db6365c55b9501ab8d92d588c010a6eed4b8c75a64e
                            • Opcode Fuzzy Hash: 5f9cc0d70e98db1396f03c15632ad39bdb3414b7ea4022c41cc645a6f601d2bb
                            • Instruction Fuzzy Hash: 68015270244708BEF7291E24CC8AF663AACAB06778F108319BAE55E1E0C6B95E55CB54
                            APIs
                              • Part of subcall function 007C594C: __FF_MSGBANNER.LIBCMT ref: 007C5963
                              • Part of subcall function 007C594C: __NMSG_WRITE.LIBCMT ref: 007C596A
                              • Part of subcall function 007C594C: RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,007C1013,?), ref: 007C598F
                            • std::exception::exception.LIBCMT ref: 007C102C
                            • __CxxThrowException@8.LIBCMT ref: 007C1041
                              • Part of subcall function 007C87DB: RaiseException.KERNEL32(?,?,?,0085BAF8,00000000,?,?,?,?,007C1046,?,0085BAF8,?,00000001), ref: 007C8830
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                            • String ID:
                            • API String ID: 3902256705-0
                            • Opcode ID: 35349ac590af7734af38a5fe2c01af710b13df2175142c417384c6ec8850f8b4
                            • Instruction ID: 7a444110b3c7559f06ba57f119806737ec0ad1b2feaf20b6c4ff7b1b9eab7337
                            • Opcode Fuzzy Hash: 35349ac590af7734af38a5fe2c01af710b13df2175142c417384c6ec8850f8b4
                            • Instruction Fuzzy Hash: 10F0A43550021DE6CB21AA98EC09FDF77A8EF01351F50046EFD04E6592EFB99AD482D1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __lock_file_memset
                            • String ID:
                            • API String ID: 26237723-0
                            • Opcode ID: 2d63fc712720821303c9ac2b71bf87b0124e4f315828dd85cbf7f9657e734eb9
                            • Instruction ID: 71102896a75f2047c6554e0ca1ccb04a39c714a41a21bad3bc3eb0b258a03c2a
                            • Opcode Fuzzy Hash: 2d63fc712720821303c9ac2b71bf87b0124e4f315828dd85cbf7f9657e734eb9
                            • Instruction Fuzzy Hash: A1018871800A04EBCF11AF658C09F9E7BA1BF40360F14821DF8145A161DB3A8A91DB51
                            APIs
                              • Part of subcall function 007C8D68: __getptd_noexit.LIBCMT ref: 007C8D68
                            • __lock_file.LIBCMT ref: 007C561B
                              • Part of subcall function 007C6E4E: __lock.LIBCMT ref: 007C6E71
                            • __fclose_nolock.LIBCMT ref: 007C5626
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                            • String ID:
                            • API String ID: 2800547568-0
                            • Opcode ID: 4bee919ab578e428d53bc8688685b2ceed775b36016acd66099573b899b6e7bc
                            • Instruction ID: aae4da73324bc005b4fa6b0fe790c3bec119cbdd7bb2a9d8b509360fd979a1a5
                            • Opcode Fuzzy Hash: 4bee919ab578e428d53bc8688685b2ceed775b36016acd66099573b899b6e7bc
                            • Instruction Fuzzy Hash: 15F0B471900A04DAD760AF75880AF6E77E16F80B34F55820DE425BB1C1CF7CAD819B5A
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00DD1ACD
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00DD1AF1
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00DD1B13
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                            • Instruction ID: 87ee00e985886780e848eaf8587f70324c2e1fcd794fa9edbb690d1f664280c9
                            • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                            • Instruction Fuzzy Hash: 6E12CE24E24658C6EB24DF64D8507DEB232EF68300F1090E9D10DEB7A5E77A4F85CB5A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9908eba9d9ad233a747be08369688fb2ae28f0beb70cca9c3d0afca5f00cde68
                            • Instruction ID: a22d87b77e0d575c34684f93073d7cbc68d7d0564edd1c7b414df2b1e46c01d6
                            • Opcode Fuzzy Hash: 9908eba9d9ad233a747be08369688fb2ae28f0beb70cca9c3d0afca5f00cde68
                            • Instruction Fuzzy Hash: 93516F35701604EFCF14EB68C999FAE77A5AF89710F148168F906AB392DA38ED01CB51
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 464124430e8de5960c13c3c2f65887e6ee4843d4792a7d1da34d152b5713a97e
                            • Instruction ID: 48b5c256e0d6ed4c79c73a187a3019fe57ee0336b217374985f9d79cbf4b77c5
                            • Opcode Fuzzy Hash: 464124430e8de5960c13c3c2f65887e6ee4843d4792a7d1da34d152b5713a97e
                            • Instruction Fuzzy Hash: 46318579208A02DFC7289F19C894A22F7E4FF8A310754C66DE9498B765E734D891CB94
                            APIs
                            • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 007A5CF6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 103c4d65d115a673dd76e0b23597f42cc17f39a3d19f729694afe327a411c6c1
                            • Instruction ID: d491a75f7c208c6ed9a9863cd4d4188e705f2fa8ad0cfc704032cd5691628c35
                            • Opcode Fuzzy Hash: 103c4d65d115a673dd76e0b23597f42cc17f39a3d19f729694afe327a411c6c1
                            • Instruction Fuzzy Hash: 43316C31A00B0AEFCB18DF2DC484A6DB7B1FF89320F148629E81993714D735B960DBA0
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClearVariant
                            • String ID:
                            • API String ID: 1473721057-0
                            • Opcode ID: 5607c34372f83d98bcc0700cd6eaac483cd4a49643206ac0e5ae54f55b65f82a
                            • Instruction ID: bd2bbb65fd708cf39a26bb68c321328c131765fc11b63d27ecc58592aca868cc
                            • Opcode Fuzzy Hash: 5607c34372f83d98bcc0700cd6eaac483cd4a49643206ac0e5ae54f55b65f82a
                            • Instruction Fuzzy Hash: A3411B74608351DFDB24DF14C488B1ABBE0BF86314F1989ACE9994B362C379EC85CB52
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                            • Instruction ID: cc3fa567222e2734827ea02ebfd69c2c2d512f1cae8f0ba07d96e6aab3be1994
                            • Opcode Fuzzy Hash: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                            • Instruction Fuzzy Hash: 5E11B431209205EFD718DF2CC885D6EB7A9EF86324724861EE915DB291DB36EC11CBD0
                            APIs
                              • Part of subcall function 007A4D13: FreeLibrary.KERNEL32(00000000,?), ref: 007A4D4D
                              • Part of subcall function 007C548B: __wfsopen.LIBCMT ref: 007C5496
                            • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,008662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 007A4F6F
                              • Part of subcall function 007A4CC8: FreeLibrary.KERNEL32(00000000), ref: 007A4D02
                              • Part of subcall function 007A4DD0: _memmove.LIBCMT ref: 007A4E1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Library$Free$Load__wfsopen_memmove
                            • String ID:
                            • API String ID: 1396898556-0
                            • Opcode ID: cba64db2f25f6d33a5a0328633a2e727cfa96fdb24d98915f1b4c7fdc1ca4148
                            • Instruction ID: a5b5ec4e18e2490f1cf6fdb5ae71da607f6dec534218ca9f20b453637bcfd7ac
                            • Opcode Fuzzy Hash: cba64db2f25f6d33a5a0328633a2e727cfa96fdb24d98915f1b4c7fdc1ca4148
                            • Instruction Fuzzy Hash: 9A11E732700205EACF24AF74DC0AF6E77A59FC1710F10963EF541A62C2DABA9A059B60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClearVariant
                            • String ID:
                            • API String ID: 1473721057-0
                            • Opcode ID: 0d197b857f97df585e271703656019992eeaa7d05d3d57d23c7b73101276a5d2
                            • Instruction ID: e3f6368411862348ce8b642b050675168343e9f3eae5bff20a7b107c1524dea5
                            • Opcode Fuzzy Hash: 0d197b857f97df585e271703656019992eeaa7d05d3d57d23c7b73101276a5d2
                            • Instruction Fuzzy Hash: 73212474608341DFCB24DF64C445B1ABBE0BF8A314F048A6CE98A47722D739E885CB92
                            APIs
                            • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,007A5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 007A5D76
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: c6e33dda6c3a5e093195cd70f2705bdecf310e65840531a3f1d0edc4a3636211
                            • Instruction ID: 8dd64f265d723a2cc1957f179125ddf355f9980489d9c98ba266ec144699ae6b
                            • Opcode Fuzzy Hash: c6e33dda6c3a5e093195cd70f2705bdecf310e65840531a3f1d0edc4a3636211
                            • Instruction Fuzzy Hash: 75113A31200B019FD3308F15C488B66B7E9FF86760F10CA2EE5AA86A50D774E945CF60
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 411600ee5b60323fd304e9777ef0334b2049183b6d4d572a11f42ac8270b644a
                            • Instruction ID: 9f78d473ddcbe4f11df4e06f8ede324fd281192e9785a4b4914e8d512626abfc
                            • Opcode Fuzzy Hash: 411600ee5b60323fd304e9777ef0334b2049183b6d4d572a11f42ac8270b644a
                            • Instruction Fuzzy Hash: C7018437509581CFA62587A59889F60BBB9FB8372431D92DD94499B023C674B81487D1
                            APIs
                            • __lock_file.LIBCMT ref: 007C4AD6
                              • Part of subcall function 007C8D68: __getptd_noexit.LIBCMT ref: 007C8D68
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __getptd_noexit__lock_file
                            • String ID:
                            • API String ID: 2597487223-0
                            • Opcode ID: 2d2f14637d0c1a3bd8875c03ef9a15b100a36d87f1ecc6d1fe144205833dc146
                            • Instruction ID: 1ac33d48d0ebc289633118868870c65bde6b32b9397b339209d30948c0a37350
                            • Opcode Fuzzy Hash: 2d2f14637d0c1a3bd8875c03ef9a15b100a36d87f1ecc6d1fe144205833dc146
                            • Instruction Fuzzy Hash: 40F0A471940219DBDFA1AF748C0AF9E77A1AF00325F04851CF8249A1D1CB7C8D51DF52
                            APIs
                            • FreeLibrary.KERNEL32(?,?,008662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 007A4FDE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID:
                            • API String ID: 3664257935-0
                            • Opcode ID: 922a45ace3b99b319c04cfcd126566bca11f68ce6127f1edecb9ab237c960c9e
                            • Instruction ID: 68b9ce0b8f225ce397679452958de42e4bfda711cd03e2b90a8df59a507cd139
                            • Opcode Fuzzy Hash: 922a45ace3b99b319c04cfcd126566bca11f68ce6127f1edecb9ab237c960c9e
                            • Instruction Fuzzy Hash: C8F03971105712CFCB349F64E494812BBF1BF8632A3289B3EE1D682610C7BAA891DF40
                            APIs
                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007C09F4
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: LongNamePath_memmove
                            • String ID:
                            • API String ID: 2514874351-0
                            • Opcode ID: 1f20398e7d6f7119f0c6035a6346e876c3bc86844bd921c6f2a6f2a6f9c8dc7c
                            • Instruction ID: d97774c1c6d6a8d1b62c63133980c91c6936398502501450f6ed348c48b48274
                            • Opcode Fuzzy Hash: 1f20398e7d6f7119f0c6035a6346e876c3bc86844bd921c6f2a6f2a6f9c8dc7c
                            • Instruction Fuzzy Hash: 24E08676A0422897C720D6989C09FFA77EDDF89690F0441B6FD4CD7205D9649C818690
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __fread_nolock
                            • String ID:
                            • API String ID: 2638373210-0
                            • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                            • Instruction ID: 6326f99085548119f8c3d84f4b891675b41c72911e2dc6d535faebc922853fc3
                            • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                            • Instruction Fuzzy Hash: C2E06DB0604B009BD7748A24D815BA373E0FB06315F00091CF2DAC3242EB66B8418759
                            APIs
                            • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,007DE16B,?,?,00000000), ref: 007A5DBF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: ab16f5beaa08cc93cd3d5c3ef1b712660d00820203b43616aa4452a0480e38b5
                            • Instruction ID: 6c94d5dfbbb28879951166047cd906c62ce934fcf08f346d9864be9983b8b674
                            • Opcode Fuzzy Hash: ab16f5beaa08cc93cd3d5c3ef1b712660d00820203b43616aa4452a0480e38b5
                            • Instruction Fuzzy Hash: D0D0C77464020CBFE710DB80DC46FA9777CE705710F500194FE0456290D6B27D508795
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __wfsopen
                            • String ID:
                            • API String ID: 197181222-0
                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                            • Instruction ID: 4a6469cda14a7cdaa1fc6fb435ce0075d1a08b5e7703fc8486f7507082bed3fa
                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                            • Instruction Fuzzy Hash: A0B0927684020CB7DE012E82EC02F593B199B40779F808024FB0C18162A677A6A09689
                            APIs
                            • GetLastError.KERNEL32(00000002,00000000), ref: 0080D46A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorLast
                            • String ID:
                            • API String ID: 1452528299-0
                            • Opcode ID: a57c9dd6e3e0221071a8c025e33342d00e2e532ab3945f58a80a6daa2114e4de
                            • Instruction ID: c48e5bafd1732cdd88ad328084a7a0a9246ab8c7a1fb8e9bc5ceb1178b5d2426
                            • Opcode Fuzzy Hash: a57c9dd6e3e0221071a8c025e33342d00e2e532ab3945f58a80a6daa2114e4de
                            • Instruction Fuzzy Hash: 87716F30204701CFC754EF64C895A6AB7E4FF89314F044A6DF9969B2A2DB34E949CB52
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction ID: fa7343088696bd816139d144ebfcbbe4415d5695af5303c2e47e55572dba193b
                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction Fuzzy Hash: 1831C271A40105DFC718EF58D480A69FBA6FF59300B688AADE40ACB651DB35EDC1CBC0
                            APIs
                            • Sleep.KERNELBASE(000001F4), ref: 00DD22B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction ID: 4b373c0a7b732c089628cf3511574eebb5597c49139a575f9d6be2335a31bb23
                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction Fuzzy Hash: 13E0E67494010EDFDB00EFB8D9496AE7FF4EF04301F100161FD01D2280D6309D509A72
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0082CE50
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0082CE91
                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0082CED6
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0082CF00
                            • SendMessageW.USER32 ref: 0082CF29
                            • _wcsncpy.LIBCMT ref: 0082CFA1
                            • GetKeyState.USER32(00000011), ref: 0082CFC2
                            • GetKeyState.USER32(00000009), ref: 0082CFCF
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0082CFE5
                            • GetKeyState.USER32(00000010), ref: 0082CFEF
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0082D018
                            • SendMessageW.USER32 ref: 0082D03F
                            • SendMessageW.USER32(?,00001030,?,0082B602), ref: 0082D145
                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0082D15B
                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0082D16E
                            • SetCapture.USER32(?), ref: 0082D177
                            • ClientToScreen.USER32(?,?), ref: 0082D1DC
                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0082D1E9
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0082D203
                            • ReleaseCapture.USER32 ref: 0082D20E
                            • GetCursorPos.USER32(?), ref: 0082D248
                            • ScreenToClient.USER32(?,?), ref: 0082D255
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0082D2B1
                            • SendMessageW.USER32 ref: 0082D2DF
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0082D31C
                            • SendMessageW.USER32 ref: 0082D34B
                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0082D36C
                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0082D37B
                            • GetCursorPos.USER32(?), ref: 0082D39B
                            • ScreenToClient.USER32(?,?), ref: 0082D3A8
                            • GetParent.USER32(?), ref: 0082D3C8
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0082D431
                            • SendMessageW.USER32 ref: 0082D462
                            • ClientToScreen.USER32(?,?), ref: 0082D4C0
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0082D4F0
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0082D51A
                            • SendMessageW.USER32 ref: 0082D53D
                            • ClientToScreen.USER32(?,?), ref: 0082D58F
                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0082D5C3
                              • Part of subcall function 007A25DB: GetWindowLongW.USER32(?,000000EB), ref: 007A25EC
                            • GetWindowLongW.USER32(?,000000F0), ref: 0082D65F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                            • String ID: @GUI_DRAGID$F
                            • API String ID: 3977979337-4164748364
                            • Opcode ID: 8295ccc16afb9f4c6e2328b54d4f07644c6eb76ff40d1a8f3fb28c9c0a0eca28
                            • Instruction ID: b3752c2dcac1e01dab88b0ef175d7d9faa04d3d884dd415659b8ba9f55f17998
                            • Opcode Fuzzy Hash: 8295ccc16afb9f4c6e2328b54d4f07644c6eb76ff40d1a8f3fb28c9c0a0eca28
                            • Instruction Fuzzy Hash: 1442CB74204351AFCB20CF28D848EAABBF5FF88314F15462DF695C72A1D771A895CB92
                            APIs
                            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0082873F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: %d/%02d/%02d
                            • API String ID: 3850602802-328681919
                            • Opcode ID: 2647e9075e473130c0baf620d797e6c0e6e0e287e0c98b4abc7ba61a82a23972
                            • Instruction ID: 009370308d81bafd33c84bc07c852c875d343aa477c78c3c023a8551b7910a6f
                            • Opcode Fuzzy Hash: 2647e9075e473130c0baf620d797e6c0e6e0e287e0c98b4abc7ba61a82a23972
                            • Instruction Fuzzy Hash: F212C171501228EFEF258F64EC49FAA7BB8FF49714F104129F915EA2A1EF748981CB50
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove$_memset
                            • String ID: DEFINE$Oa{$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                            • API String ID: 1357608183-2822103939
                            • Opcode ID: 2635fc4aeb8e113cc4a6c58143b706d30c4c30c4525f12d4053285bbec2645c3
                            • Instruction ID: 94326317a94c6cf033ee93f18cd91e05cacabe087b5850b7a8ea1b92d55cb69d
                            • Opcode Fuzzy Hash: 2635fc4aeb8e113cc4a6c58143b706d30c4c30c4525f12d4053285bbec2645c3
                            • Instruction Fuzzy Hash: 68936F71A04219DBDB24CF58C881BBDB7B1FF48710F25816AEA55EB381E7789E81CB50
                            APIs
                            • GetForegroundWindow.USER32(00000000,?), ref: 007A4A3D
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007DDA8E
                            • IsIconic.USER32(?), ref: 007DDA97
                            • ShowWindow.USER32(?,00000009), ref: 007DDAA4
                            • SetForegroundWindow.USER32(?), ref: 007DDAAE
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007DDAC4
                            • GetCurrentThreadId.KERNEL32 ref: 007DDACB
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 007DDAD7
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 007DDAE8
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 007DDAF0
                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 007DDAF8
                            • SetForegroundWindow.USER32(?), ref: 007DDAFB
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 007DDB10
                            • keybd_event.USER32(00000012,00000000), ref: 007DDB1B
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 007DDB25
                            • keybd_event.USER32(00000012,00000000), ref: 007DDB2A
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 007DDB33
                            • keybd_event.USER32(00000012,00000000), ref: 007DDB38
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 007DDB42
                            • keybd_event.USER32(00000012,00000000), ref: 007DDB47
                            • SetForegroundWindow.USER32(?), ref: 007DDB4A
                            • AttachThreadInput.USER32(?,?,00000000), ref: 007DDB71
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                            • String ID: Shell_TrayWnd
                            • API String ID: 4125248594-2988720461
                            • Opcode ID: 4014ee3aaa8ca27968572514aaf0b0dfecec32b795c319124688cdb4d8656ebc
                            • Instruction ID: 157b55dd9e4281114f452f2df311e79774e55d185a75f1bdb52fa3ffa0fc9f5d
                            • Opcode Fuzzy Hash: 4014ee3aaa8ca27968572514aaf0b0dfecec32b795c319124688cdb4d8656ebc
                            • Instruction Fuzzy Hash: B5313071A40218BBEB316BA19D49F7E3E7CEB44B50F118036FA05AA291D6B45D01EAA0
                            APIs
                              • Part of subcall function 007F8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F8D0D
                              • Part of subcall function 007F8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F8D3A
                              • Part of subcall function 007F8CC3: GetLastError.KERNEL32 ref: 007F8D47
                            • _memset.LIBCMT ref: 007F889B
                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007F88ED
                            • CloseHandle.KERNEL32(?), ref: 007F88FE
                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007F8915
                            • GetProcessWindowStation.USER32 ref: 007F892E
                            • SetProcessWindowStation.USER32(00000000), ref: 007F8938
                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007F8952
                              • Part of subcall function 007F8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F8851), ref: 007F8728
                              • Part of subcall function 007F8713: CloseHandle.KERNEL32(?,?,007F8851), ref: 007F873A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                            • String ID: $default$winsta0
                            • API String ID: 2063423040-1027155976
                            • Opcode ID: 5cab3b0e2aca27a9f7dcb838f8827860d23422f264493c8e3f53eb46f4f1e31e
                            • Instruction ID: f55b1555124f8bf79bb3af395aac4a64ceed7f9b52d3ac2b9a59631a534cd3d1
                            • Opcode Fuzzy Hash: 5cab3b0e2aca27a9f7dcb838f8827860d23422f264493c8e3f53eb46f4f1e31e
                            • Instruction Fuzzy Hash: 81812B7190024DAFDF51DFA4DC49ABE7BB8FF04304F18816AFA10A6261DB398A15DB61
                            APIs
                            • OpenClipboard.USER32(0082F910), ref: 00814284
                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00814292
                            • GetClipboardData.USER32(0000000D), ref: 0081429A
                            • CloseClipboard.USER32 ref: 008142A6
                            • GlobalLock.KERNEL32(00000000), ref: 008142C2
                            • CloseClipboard.USER32 ref: 008142CC
                            • GlobalUnlock.KERNEL32(00000000,00000000), ref: 008142E1
                            • IsClipboardFormatAvailable.USER32(00000001), ref: 008142EE
                            • GetClipboardData.USER32(00000001), ref: 008142F6
                            • GlobalLock.KERNEL32(00000000), ref: 00814303
                            • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00814337
                            • CloseClipboard.USER32 ref: 00814447
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                            • String ID:
                            • API String ID: 3222323430-0
                            • Opcode ID: 5bade93f3f9be0304a8477b9c125539dddecd49935a6502c2c8a2ac06160107a
                            • Instruction ID: aad2cf15b09a5706372bd73ce17877103e37c7d1d43983927b34f3b194df69fb
                            • Opcode Fuzzy Hash: 5bade93f3f9be0304a8477b9c125539dddecd49935a6502c2c8a2ac06160107a
                            • Instruction Fuzzy Hash: 81518071204205ABD311AF64DC8AFAE77BCFF85B00F108639F655D21A2DB74D945CB62
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 0080C9F8
                            • FindClose.KERNEL32(00000000), ref: 0080CA4C
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0080CA71
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0080CA88
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0080CAAF
                            • __swprintf.LIBCMT ref: 0080CAFB
                            • __swprintf.LIBCMT ref: 0080CB3E
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                            • __swprintf.LIBCMT ref: 0080CB92
                              • Part of subcall function 007C38D8: __woutput_l.LIBCMT ref: 007C3931
                            • __swprintf.LIBCMT ref: 0080CBE0
                              • Part of subcall function 007C38D8: __flsbuf.LIBCMT ref: 007C3953
                              • Part of subcall function 007C38D8: __flsbuf.LIBCMT ref: 007C396B
                            • __swprintf.LIBCMT ref: 0080CC2F
                            • __swprintf.LIBCMT ref: 0080CC7E
                            • __swprintf.LIBCMT ref: 0080CCCD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                            • API String ID: 3953360268-2428617273
                            • Opcode ID: d9595e779284c8a684edb156d089063c917a83eeabd11f649bf5428cd76d2d16
                            • Instruction ID: 34c420021c8db5852a34bbeaadecd0bde397c98bf72a899d5178c07b9fb58fa3
                            • Opcode Fuzzy Hash: d9595e779284c8a684edb156d089063c917a83eeabd11f649bf5428cd76d2d16
                            • Instruction Fuzzy Hash: 76A11FB1508305EBC754EB64CC8ADAFB7ECFF95700F404A2DB685D6191EA38DA09C762
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0080F221
                            • _wcscmp.LIBCMT ref: 0080F236
                            • _wcscmp.LIBCMT ref: 0080F24D
                            • GetFileAttributesW.KERNEL32(?), ref: 0080F25F
                            • SetFileAttributesW.KERNEL32(?,?), ref: 0080F279
                            • FindNextFileW.KERNEL32(00000000,?), ref: 0080F291
                            • FindClose.KERNEL32(00000000), ref: 0080F29C
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0080F2B8
                            • _wcscmp.LIBCMT ref: 0080F2DF
                            • _wcscmp.LIBCMT ref: 0080F2F6
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0080F308
                            • SetCurrentDirectoryW.KERNEL32(0085A5A0), ref: 0080F326
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0080F330
                            • FindClose.KERNEL32(00000000), ref: 0080F33D
                            • FindClose.KERNEL32(00000000), ref: 0080F34F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                            • String ID: *.*
                            • API String ID: 1803514871-438819550
                            • Opcode ID: d357a0d599f7f2168edd0c8d0cb807e3bfc44d48dd145187997cc1e145058bae
                            • Instruction ID: 95d3bab53f1293b64b5acf19c7d7cb63b69dd9ccb8862c6ce0d76743d721242d
                            • Opcode Fuzzy Hash: d357a0d599f7f2168edd0c8d0cb807e3bfc44d48dd145187997cc1e145058bae
                            • Instruction Fuzzy Hash: 0E31C576501219AADB70DBB4DC89EDE73ACFF09361F108279EA10E31D2EB34DA45CA50
                            APIs
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00820BDE
                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0082F910,00000000,?,00000000,?,?), ref: 00820C4C
                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00820C94
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00820D1D
                            • RegCloseKey.ADVAPI32(?), ref: 0082103D
                            • RegCloseKey.ADVAPI32(00000000), ref: 0082104A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Close$ConnectCreateRegistryValue
                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                            • API String ID: 536824911-966354055
                            • Opcode ID: dfe3c7e2afb11428581f1c48cac507a2d931aae60d230f05f975016de71ebfd8
                            • Instruction ID: a33791806012a14756a2e25f96c83fd0617b9f322411932d9982b14852910ec6
                            • Opcode Fuzzy Hash: dfe3c7e2afb11428581f1c48cac507a2d931aae60d230f05f975016de71ebfd8
                            • Instruction Fuzzy Hash: CE023775200611EFCB14EF24D889A2AB7E5FF89714F04895DF98A9B362DB34ED41CB81
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0080F37E
                            • _wcscmp.LIBCMT ref: 0080F393
                            • _wcscmp.LIBCMT ref: 0080F3AA
                              • Part of subcall function 008045C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 008045DC
                            • FindNextFileW.KERNEL32(00000000,?), ref: 0080F3D9
                            • FindClose.KERNEL32(00000000), ref: 0080F3E4
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0080F400
                            • _wcscmp.LIBCMT ref: 0080F427
                            • _wcscmp.LIBCMT ref: 0080F43E
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0080F450
                            • SetCurrentDirectoryW.KERNEL32(0085A5A0), ref: 0080F46E
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0080F478
                            • FindClose.KERNEL32(00000000), ref: 0080F485
                            • FindClose.KERNEL32(00000000), ref: 0080F497
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                            • String ID: *.*
                            • API String ID: 1824444939-438819550
                            • Opcode ID: bf99360d086cf5c681c3b54c01ea0856e34d2e93a000302bdd57f18324c2556b
                            • Instruction ID: 037b59ee274669c893f469afdb3abb5ade2c6cb7e3f9c27d4b6658286b18f889
                            • Opcode Fuzzy Hash: bf99360d086cf5c681c3b54c01ea0856e34d2e93a000302bdd57f18324c2556b
                            • Instruction Fuzzy Hash: 1831D5715016196ACB20ABA4EC88EDE77ACFF05321F108275EE10E21E2D734DA45CA54
                            APIs
                              • Part of subcall function 007F874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F8766
                              • Part of subcall function 007F874A: GetLastError.KERNEL32(?,007F822A,?,?,?), ref: 007F8770
                              • Part of subcall function 007F874A: GetProcessHeap.KERNEL32(00000008,?,?,007F822A,?,?,?), ref: 007F877F
                              • Part of subcall function 007F874A: HeapAlloc.KERNEL32(00000000,?,007F822A,?,?,?), ref: 007F8786
                              • Part of subcall function 007F874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F879D
                              • Part of subcall function 007F87E7: GetProcessHeap.KERNEL32(00000008,007F8240,00000000,00000000,?,007F8240,?), ref: 007F87F3
                              • Part of subcall function 007F87E7: HeapAlloc.KERNEL32(00000000,?,007F8240,?), ref: 007F87FA
                              • Part of subcall function 007F87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,007F8240,?), ref: 007F880B
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F825B
                            • _memset.LIBCMT ref: 007F8270
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F828F
                            • GetLengthSid.ADVAPI32(?), ref: 007F82A0
                            • GetAce.ADVAPI32(?,00000000,?), ref: 007F82DD
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F82F9
                            • GetLengthSid.ADVAPI32(?), ref: 007F8316
                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 007F8325
                            • HeapAlloc.KERNEL32(00000000), ref: 007F832C
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F834D
                            • CopySid.ADVAPI32(00000000), ref: 007F8354
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F8385
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F83AB
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F83BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                            • String ID:
                            • API String ID: 3996160137-0
                            • Opcode ID: dd9fcbe3fd06146bcff1322c5e09fbfb9b15c10953f7231f863d101e27dd22ed
                            • Instruction ID: 93197c7a851da33f458bc9d71b7677f7fb154377f799621c539931fa70b6028d
                            • Opcode Fuzzy Hash: dd9fcbe3fd06146bcff1322c5e09fbfb9b15c10953f7231f863d101e27dd22ed
                            • Instruction Fuzzy Hash: D5615A71900219EBDF10DFA4DC85EFEBBB9FF04700F148129EA15A63A1DB399A05CB61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oa{$UCP)$UTF)$UTF16)
                            • API String ID: 0-2780239882
                            • Opcode ID: f8652919fef2a6613d383bab1e047e81c83b1ac550102ddcc6750a34964a31ce
                            • Instruction ID: a6697075603239852974939b888d24aac6cb43c2711c46600b415e74f67373c8
                            • Opcode Fuzzy Hash: f8652919fef2a6613d383bab1e047e81c83b1ac550102ddcc6750a34964a31ce
                            • Instruction Fuzzy Hash: 6C724D75E00219DADB14DF58C8907FEB7B5FF48310F54816AEA49EB390EB789981CB90
                            APIs
                              • Part of subcall function 008210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00820038,?,?), ref: 008210BC
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00820737
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 008207D6
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0082086E
                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00820AAD
                            • RegCloseKey.ADVAPI32(00000000), ref: 00820ABA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                            • String ID:
                            • API String ID: 1240663315-0
                            • Opcode ID: 38e59de5eff32ed81407000a45c90bb8cd652d56b636b494b341ce2c6ab153f0
                            • Instruction ID: 1a47df2537b04c59a413d85bd1178a3328aecc80a71a7d4b9a679c586e4c6d45
                            • Opcode Fuzzy Hash: 38e59de5eff32ed81407000a45c90bb8cd652d56b636b494b341ce2c6ab153f0
                            • Instruction Fuzzy Hash: 71E12A71204224EFCB14DF28D885E6ABBF8FF89714B04856DF94ADB262DA34E941CB51
                            APIs
                            • GetKeyboardState.USER32(?), ref: 00800241
                            • GetAsyncKeyState.USER32(000000A0), ref: 008002C2
                            • GetKeyState.USER32(000000A0), ref: 008002DD
                            • GetAsyncKeyState.USER32(000000A1), ref: 008002F7
                            • GetKeyState.USER32(000000A1), ref: 0080030C
                            • GetAsyncKeyState.USER32(00000011), ref: 00800324
                            • GetKeyState.USER32(00000011), ref: 00800336
                            • GetAsyncKeyState.USER32(00000012), ref: 0080034E
                            • GetKeyState.USER32(00000012), ref: 00800360
                            • GetAsyncKeyState.USER32(0000005B), ref: 00800378
                            • GetKeyState.USER32(0000005B), ref: 0080038A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: ec30534bc963e5f2151bfbe3d5e1bd27302016bb07027862e02aee33745217e3
                            • Instruction ID: 65460e6cc83295f8d7ec7ffea3637abb485250e1e54ceb413fa7802e7a3d235a
                            • Opcode Fuzzy Hash: ec30534bc963e5f2151bfbe3d5e1bd27302016bb07027862e02aee33745217e3
                            • Instruction Fuzzy Hash: 00418A245047C96EFFB25B648D083B5BEA1FF12344F08815DD5C5D62C2D79459C4CF92
                            APIs
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • CoInitialize.OLE32 ref: 00818718
                            • CoUninitialize.OLE32 ref: 00818723
                            • CoCreateInstance.OLE32(?,00000000,00000017,00832BEC,?), ref: 00818783
                            • IIDFromString.OLE32(?,?), ref: 008187F6
                            • VariantInit.OLEAUT32(?), ref: 00818890
                            • VariantClear.OLEAUT32(?), ref: 008188F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                            • API String ID: 834269672-1287834457
                            • Opcode ID: a1e2ae7d444e782bd46a0daedcda27b399f3bb9bb94c398932e28649b3aba57d
                            • Instruction ID: c488b2b16c78531c3ce9b4e00ed6fe5f0d34d613f1416dad773ec038b7e4c152
                            • Opcode Fuzzy Hash: a1e2ae7d444e782bd46a0daedcda27b399f3bb9bb94c398932e28649b3aba57d
                            • Instruction Fuzzy Hash: 2D617E70608301DFD710DF24C98AAAABBE8FF85714F144929F995DB291CB74ED84CB92
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                            • String ID:
                            • API String ID: 1737998785-0
                            • Opcode ID: 75bfadf0e1b7a461f75e882424d43bf61ec2b394e7db7187817096a08d14207c
                            • Instruction ID: f6c58ba5d5b915f93fc7477be6d2bff5eaa1f0e3816bac52fa0c2d02ca3b37eb
                            • Opcode Fuzzy Hash: 75bfadf0e1b7a461f75e882424d43bf61ec2b394e7db7187817096a08d14207c
                            • Instruction Fuzzy Hash: 2E215C35201214DFDB20AF64EC09BA977A8FF54715F10C02AFA46DB2B2DB74A941CB54
                            APIs
                              • Part of subcall function 007A48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007A48A1,?,?,007A37C0,?), ref: 007A48CE
                              • Part of subcall function 00804CD3: GetFileAttributesW.KERNEL32(?,00803947), ref: 00804CD4
                            • FindFirstFileW.KERNEL32(?,?), ref: 00803ADF
                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00803B87
                            • MoveFileW.KERNEL32(?,?), ref: 00803B9A
                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00803BB7
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00803BD9
                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00803BF5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                            • String ID: \*.*
                            • API String ID: 4002782344-1173974218
                            • Opcode ID: 53e78f42dff0ae23ba46cc1d1de0b98bf3aa8f16e119d7b3bc952dfe228ce946
                            • Instruction ID: 18af4f87d8236282dc0b237d8694d424375bce3836f70d07dc429ee7d2c77850
                            • Opcode Fuzzy Hash: 53e78f42dff0ae23ba46cc1d1de0b98bf3aa8f16e119d7b3bc952dfe228ce946
                            • Instruction Fuzzy Hash: A9519D3190114C9ACF15EBA0CE968EDB7B8FF55314F2442A9E442B7092EF356F09CBA1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID: ERCP$Oa{$VUUU$VUUU$VUUU$VUUU
                            • API String ID: 0-1305645865
                            • Opcode ID: eabd216267d4cbd29e943a53f9a44ea8b01a2b26427b796f770357a14396f85a
                            • Instruction ID: 7cd3672e436336cefcafc773a1143d4c5a802249370e054d0769d89bbda253fa
                            • Opcode Fuzzy Hash: eabd216267d4cbd29e943a53f9a44ea8b01a2b26427b796f770357a14396f85a
                            • Instruction Fuzzy Hash: 37A29070E0525ACBDF28CF59C9807EDB7B1FF54314F1481AAD85AA7282E7389E81CB51
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0080F6AB
                            • Sleep.KERNEL32(0000000A), ref: 0080F6DB
                            • _wcscmp.LIBCMT ref: 0080F6EF
                            • _wcscmp.LIBCMT ref: 0080F70A
                            • FindNextFileW.KERNEL32(?,?), ref: 0080F7A8
                            • FindClose.KERNEL32(00000000), ref: 0080F7BE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                            • String ID: *.*
                            • API String ID: 713712311-438819550
                            • Opcode ID: 32b57226841b7b201ed5262fbea31160421d35e5ca289e53d183ea8693ae6c66
                            • Instruction ID: 2fc7fcd1cc93059fed959b961e477be96b85f3b954b972753b522ab65348538f
                            • Opcode Fuzzy Hash: 32b57226841b7b201ed5262fbea31160421d35e5ca289e53d183ea8693ae6c66
                            • Instruction Fuzzy Hash: 7A41AF7190420A9FCF65DF64CC89AEEBBB4FF05310F14856AE914E2292EB349E44CB91
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 5b33c8c5ef4f2c42353def7506a3488311c60fc7e6e6051690fefc04eeba7825
                            • Instruction ID: 3ce640aa94c17f201c1c3b0703cbffc28a3a6a15c8bffae7c5dff69ab99c8dd7
                            • Opcode Fuzzy Hash: 5b33c8c5ef4f2c42353def7506a3488311c60fc7e6e6051690fefc04eeba7825
                            • Instruction Fuzzy Hash: 39126970A00609DFDF14DFA4D985BEEB7B5FF48300F108669E406A7292EB39AD51CB91
                            APIs
                              • Part of subcall function 007C0FF6: std::exception::exception.LIBCMT ref: 007C102C
                              • Part of subcall function 007C0FF6: __CxxThrowException@8.LIBCMT ref: 007C1041
                            • _memmove.LIBCMT ref: 007F062F
                            • _memmove.LIBCMT ref: 007F0744
                            • _memmove.LIBCMT ref: 007F07EB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                            • String ID: yZ{
                            • API String ID: 1300846289-602052519
                            • Opcode ID: 3972fec384aa46d2e61904048f287ee5482f2cbe80e901f26e668c584c223ee4
                            • Instruction ID: 3753617838676a170d16ca64b78d5d628efe067ba801d8bfc14a17a1ad571229
                            • Opcode Fuzzy Hash: 3972fec384aa46d2e61904048f287ee5482f2cbe80e901f26e668c584c223ee4
                            • Instruction Fuzzy Hash: 0A025CB0A00209DBDF04DF64D985ABEBBB5FF84310F1480A9E906DB356EB39D951CB91
                            APIs
                              • Part of subcall function 007F8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F8D0D
                              • Part of subcall function 007F8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F8D3A
                              • Part of subcall function 007F8CC3: GetLastError.KERNEL32 ref: 007F8D47
                            • ExitWindowsEx.USER32(?,00000000), ref: 0080549B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                            • String ID: $@$SeShutdownPrivilege
                            • API String ID: 2234035333-194228
                            • Opcode ID: 7a7a7a76dc9e1e563b8e998bc17a533fb46a01e3efe19fbd39964313a67eb262
                            • Instruction ID: 3622ebd958eac5df236e060e730ebad3470376acad6c2c9414d9148ffe2381b5
                            • Opcode Fuzzy Hash: 7a7a7a76dc9e1e563b8e998bc17a533fb46a01e3efe19fbd39964313a67eb262
                            • Instruction Fuzzy Hash: 490124B1654E096AF7F866789C4ABFB7268FB05352F200531FE06D21D3DA540C8089B8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __itow__swprintf
                            • String ID: Oa{
                            • API String ID: 674341424-1068949949
                            • Opcode ID: 9d36de45d67e6893a08b276442fd5d9f6fcb321394e86a8c9f7f7256aa0d4aa8
                            • Instruction ID: 40ccc4f32db7de56f3430f719832d60f2b9b9a045ab5b50068e0025b6c134c8b
                            • Opcode Fuzzy Hash: 9d36de45d67e6893a08b276442fd5d9f6fcb321394e86a8c9f7f7256aa0d4aa8
                            • Instruction Fuzzy Hash: 96228A71608341DFC724DF24C885BABB7E4BF89704F10492DF59697291EB38EA44CB92
                            APIs
                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 008165EF
                            • WSAGetLastError.WSOCK32(00000000), ref: 008165FE
                            • bind.WSOCK32(00000000,?,00000010), ref: 0081661A
                            • listen.WSOCK32(00000000,00000005), ref: 00816629
                            • WSAGetLastError.WSOCK32(00000000), ref: 00816643
                            • closesocket.WSOCK32(00000000,00000000), ref: 00816657
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorLast$bindclosesocketlistensocket
                            • String ID:
                            • API String ID: 1279440585-0
                            • Opcode ID: b1b4801bc4933b657c70c594b70ebafe72df4793f393fd86abf9b470bdf1fffe
                            • Instruction ID: 957412fed1316267086eb766711afe1c821842f4bba870ba369eb0b99a0f07ed
                            • Opcode Fuzzy Hash: b1b4801bc4933b657c70c594b70ebafe72df4793f393fd86abf9b470bdf1fffe
                            • Instruction Fuzzy Hash: A4218F31200604DFCB10AF64C849AAEB7B9FF45720F148269FA56E73E2DB74AD51CB51
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 007A19FA
                            • GetSysColor.USER32(0000000F), ref: 007A1A4E
                            • SetBkColor.GDI32(?,00000000), ref: 007A1A61
                              • Part of subcall function 007A1290: DefDlgProcW.USER32(?,00000020,?), ref: 007A12D8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ColorProc$LongWindow
                            • String ID:
                            • API String ID: 3744519093-0
                            • Opcode ID: b0132e960fc2c7f90940d1c3b1dfef6e35ebb97a17a2ec4ef0a93eab359ef8b3
                            • Instruction ID: 467fba3e43fbb4e54a3bb4a4293db1bec7405ef50ce24a31c62bb12979afaa59
                            • Opcode Fuzzy Hash: b0132e960fc2c7f90940d1c3b1dfef6e35ebb97a17a2ec4ef0a93eab359ef8b3
                            • Instruction Fuzzy Hash: ADA147B1105594FAF628AB395C48DBF26ADFBC3341F96831BF402D6292DE1C9D41D2B2
                            APIs
                              • Part of subcall function 008180A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 008180CB
                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00816AB1
                            • WSAGetLastError.WSOCK32(00000000), ref: 00816ADA
                            • bind.WSOCK32(00000000,?,00000010), ref: 00816B13
                            • WSAGetLastError.WSOCK32(00000000), ref: 00816B20
                            • closesocket.WSOCK32(00000000,00000000), ref: 00816B34
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 99427753-0
                            • Opcode ID: d2516676519439649c134c29a1554ef80f0a53e1550771ae43d1e7796a7b3bbd
                            • Instruction ID: feda0e5dfedb301ea3fb11fb22e7a0285801cf3c9a8610ca33c0de767cb4f18a
                            • Opcode Fuzzy Hash: d2516676519439649c134c29a1554ef80f0a53e1550771ae43d1e7796a7b3bbd
                            • Instruction Fuzzy Hash: BB41C675B00214EFEB10AF24DC8AF6E77A8EF85710F008158FA45AB3D2DA749D118791
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                            • String ID:
                            • API String ID: 292994002-0
                            • Opcode ID: f478da335a040de284951ee834a79fa6d421cd09f016806e72c51fc3ea646e9a
                            • Instruction ID: dba5b1690d9f4184dd847c55b975c0b14a1faf963e0524577c57fae9edf8ff64
                            • Opcode Fuzzy Hash: f478da335a040de284951ee834a79fa6d421cd09f016806e72c51fc3ea646e9a
                            • Instruction Fuzzy Hash: E011E731740921AFE7211F26EC48B6F77A9FFA5721B448039F906D7252CB34DD42CAA4
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,007E1D88,?), ref: 0081C312
                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0081C324
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                            • API String ID: 2574300362-1816364905
                            • Opcode ID: 27ea6c8363528aa5b81af72ce6031a7050401104a63011894a5b90f373f0da86
                            • Instruction ID: 0afe002be870806534b7e80097ffd6f37a6b78f0b43bf6722e47f6e88867427a
                            • Opcode Fuzzy Hash: 27ea6c8363528aa5b81af72ce6031a7050401104a63011894a5b90f373f0da86
                            • Instruction Fuzzy Hash: EDE0EC74640713CFDB314B25D808A8676E8FF18755F80C43AE9A9D2351E774D8D1CA60
                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0081F151
                            • Process32FirstW.KERNEL32(00000000,?), ref: 0081F15F
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                            • Process32NextW.KERNEL32(00000000,?), ref: 0081F21F
                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0081F22E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                            • String ID:
                            • API String ID: 2576544623-0
                            • Opcode ID: 7cbbfeb507c3d5f9ce02adf4265810c53dd8a93488b94fc2762be7d7cd9ce115
                            • Instruction ID: d0eabf3cf51a8ab79ecccd45b57ef2c388dcc12c470f1aa73ae125281bf4663d
                            • Opcode Fuzzy Hash: 7cbbfeb507c3d5f9ce02adf4265810c53dd8a93488b94fc2762be7d7cd9ce115
                            • Instruction Fuzzy Hash: 33514C71504300AFD310EF24DC85AABBBE8FF95710F504A2DF595972A2EB749904CB92
                            APIs
                            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 008040D1
                            • _memset.LIBCMT ref: 008040F2
                            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00804144
                            • CloseHandle.KERNEL32(00000000), ref: 0080414D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CloseControlCreateDeviceFileHandle_memset
                            • String ID:
                            • API String ID: 1157408455-0
                            • Opcode ID: a072dcd857088c4556ebd05d9d08fa344f05780159b87fe3a2a4cf3d20e1e168
                            • Instruction ID: f42485ae861f8875752fad84434a1e5334950f1c76d95d5a9566fe50b8fb1065
                            • Opcode Fuzzy Hash: a072dcd857088c4556ebd05d9d08fa344f05780159b87fe3a2a4cf3d20e1e168
                            • Instruction Fuzzy Hash: 3711EB75941228BAD7309BA59C4DFABBB7CEF45760F1041AAFA08E7180D6744E80CBA4
                            APIs
                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007FEB19
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: lstrlen
                            • String ID: ($|
                            • API String ID: 1659193697-1631851259
                            • Opcode ID: b5ad9570f90bc1b602e99c751aa6a192b588bdaffba4ca27be3807824e9f4473
                            • Instruction ID: ebe5ed1efba1f41ff52163ebb4abec20e743eb3861aacf595a96dda11062ec26
                            • Opcode Fuzzy Hash: b5ad9570f90bc1b602e99c751aa6a192b588bdaffba4ca27be3807824e9f4473
                            • Instruction Fuzzy Hash: C0322575A00605DFD728CF19C481A6AB7F1FF48310B15C56EE99ADB3A1EB70E981CB40
                            APIs
                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 008126D5
                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0081270C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Internet$AvailableDataFileQueryRead
                            • String ID:
                            • API String ID: 599397726-0
                            • Opcode ID: fb068e537f383fba6870b9df997a51826b1488019506e721aed0724a0181f371
                            • Instruction ID: 3fe90aa523e831bb546dc09f42f8df435773efe82c12493c4d24909b81d50a1e
                            • Opcode Fuzzy Hash: fb068e537f383fba6870b9df997a51826b1488019506e721aed0724a0181f371
                            • Instruction Fuzzy Hash: 6941A071600209BFEB209A94DC85EFBB7BCFF50728F10446EFA05E6181EA719EE19754
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0080B5AE
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0080B608
                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0080B655
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID:
                            • API String ID: 1682464887-0
                            • Opcode ID: 94cde5c217331e441daba075db9717f6d552c60c74a06415b36ea68bc07c69f1
                            • Instruction ID: d02118d887280fed9af8e6fa2793dd0a7c864fe748500cf8351e57edee138ef0
                            • Opcode Fuzzy Hash: 94cde5c217331e441daba075db9717f6d552c60c74a06415b36ea68bc07c69f1
                            • Instruction Fuzzy Hash: 39219035A00118EFCB00EF65DC85AEDBBB8FF89310F0480A9E905EB361DB31A916CB51
                            APIs
                              • Part of subcall function 007C0FF6: std::exception::exception.LIBCMT ref: 007C102C
                              • Part of subcall function 007C0FF6: __CxxThrowException@8.LIBCMT ref: 007C1041
                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F8D0D
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F8D3A
                            • GetLastError.KERNEL32 ref: 007F8D47
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                            • String ID:
                            • API String ID: 1922334811-0
                            • Opcode ID: c388b0510c9e618cbc5386a23bda96256807ecb6bbd212c7066166599b3a73b2
                            • Instruction ID: 60e1bc4b5b75fe48d55cac3833d8f2ada3e56c52500dc29814f19a8e027119e6
                            • Opcode Fuzzy Hash: c388b0510c9e618cbc5386a23bda96256807ecb6bbd212c7066166599b3a73b2
                            • Instruction Fuzzy Hash: 86116DB1514209AFD7289F54DC89D6BB7BCFB44710B20852EF55692242EB34A841CA60
                            APIs
                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00804C2C
                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00804C43
                            • FreeSid.ADVAPI32(?), ref: 00804C53
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AllocateCheckFreeInitializeMembershipToken
                            • String ID:
                            • API String ID: 3429775523-0
                            • Opcode ID: 2ed2162f3b741163a4f0f49bee4d396b0281b1b5308ed94fd0fc1e62bc34cf79
                            • Instruction ID: e42ccc0dced97ce483b27e2560d2924faea0cdbb8eed38833fb2ddbea4aec030
                            • Opcode Fuzzy Hash: 2ed2162f3b741163a4f0f49bee4d396b0281b1b5308ed94fd0fc1e62bc34cf79
                            • Instruction Fuzzy Hash: E7F03C75951308BBDB04DFE09D89AADB7B8FB08201F004469A601E2182D7705A448B50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3668c5ae649eacacecc01c29b7495206b8aedf78e3dafe54b47dabfa1ab57008
                            • Instruction ID: c086cd78f52b934389d1656c33216a6024026a55bf02b0da21cf5a3d6d97bd16
                            • Opcode Fuzzy Hash: 3668c5ae649eacacecc01c29b7495206b8aedf78e3dafe54b47dabfa1ab57008
                            • Instruction Fuzzy Hash: 3F22B070A00219CFDB24DF54C494BAEB7F5FF8A310F148269E8569B391E738AD85CB91
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 0080C966
                            • FindClose.KERNEL32(00000000), ref: 0080C996
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: f955594548db62e78175b1fcf5a201eeb1e8606d8575038dd3d703adf53deaca
                            • Instruction ID: 42f67ec1d72213f7ebe5516a32719d1273f388126bba6b2979300aabb458294a
                            • Opcode Fuzzy Hash: f955594548db62e78175b1fcf5a201eeb1e8606d8575038dd3d703adf53deaca
                            • Instruction Fuzzy Hash: 321152716106049FD710DF29D84996AF7E9FF85324F00C61EF9A5D72A1DB34AC11CB81
                            APIs
                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0081977D,?,0082FB84,?), ref: 0080A302
                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0081977D,?,0082FB84,?), ref: 0080A314
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorFormatLastMessage
                            • String ID:
                            • API String ID: 3479602957-0
                            • Opcode ID: 5775713cf3de0dc298872b057d98789617ae9caad5157b53f6c58f8acf2a4456
                            • Instruction ID: 7a9eec340545bc29454778c9c67b86f953d15eb32fa1e06ea8636b0432270086
                            • Opcode Fuzzy Hash: 5775713cf3de0dc298872b057d98789617ae9caad5157b53f6c58f8acf2a4456
                            • Instruction Fuzzy Hash: 15F0823554532DFBDB209FA4CC49FEA776DFF09761F008266B908D6281D6309940CBA1
                            APIs
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F8851), ref: 007F8728
                            • CloseHandle.KERNEL32(?,?,007F8851), ref: 007F873A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AdjustCloseHandlePrivilegesToken
                            • String ID:
                            • API String ID: 81990902-0
                            • Opcode ID: 5306788a2ac19fba898f396be0e8384813dd76bf2a5cc69fc2f6f084b598b852
                            • Instruction ID: 37c371cd2d67a85357965d90670f724774847c7256478aeb52d716c268083019
                            • Opcode Fuzzy Hash: 5306788a2ac19fba898f396be0e8384813dd76bf2a5cc69fc2f6f084b598b852
                            • Instruction Fuzzy Hash: D1E0B676010610EEE7352B61EC09E777BA9FB04750B24883DB99680472DB66ACD1DB10
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,007C8F97,?,?,?,00000001), ref: 007CA39A
                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 007CA3A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 9dd1281d62af64eff73a7673de1e6e3bac4bd9e7a70b491f554e2dbbc1b23612
                            • Instruction ID: 79e1d731e341581cdd9e4f5eb33024c394ae54fa9b3ff86186777837e361dbd4
                            • Opcode Fuzzy Hash: 9dd1281d62af64eff73a7673de1e6e3bac4bd9e7a70b491f554e2dbbc1b23612
                            • Instruction Fuzzy Hash: F6B09231054208EBCA106B91EC0DB883F78FB44AA2F408030F70D84262CB625452CA91
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d24162710297659ec3cdc51bd3f21550ab5dd480cfb0effb59f33ece379cab26
                            • Instruction ID: 48ad6c59956ad97b53f835c45968cfca022544af86003903ec41f1d0f723cdd6
                            • Opcode Fuzzy Hash: d24162710297659ec3cdc51bd3f21550ab5dd480cfb0effb59f33ece379cab26
                            • Instruction Fuzzy Hash: 19322362D29F454DD7239634DC32336A399AFB73D4F15DB3BE819B5AA6EB28C4834100
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b6bb763cd3c534007ebc2b2826dd40b0878583a696ddaa0d18a6d6a4c907ce6b
                            • Instruction ID: 7bca92a71d401f059e1bd49ce2b15b5741c92f75dee4aa7805e5a9cfc24a72cc
                            • Opcode Fuzzy Hash: b6bb763cd3c534007ebc2b2826dd40b0878583a696ddaa0d18a6d6a4c907ce6b
                            • Instruction Fuzzy Hash: A7B1EE21D2AF414DD623A6398831336BA5CBFFB2D5F51DB1BFC6670E22EB2285834141
                            APIs
                            • __time64.LIBCMT ref: 00808B25
                              • Part of subcall function 007C543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,008091F8,00000000,?,?,?,?,008093A9,00000000,?), ref: 007C5443
                              • Part of subcall function 007C543A: __aulldiv.LIBCMT ref: 007C5463
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Time$FileSystem__aulldiv__time64
                            • String ID:
                            • API String ID: 2893107130-0
                            • Opcode ID: a280c3e6827662c4547a8dc763e1d818293d5ed18f5f6c4b512c2857c50330ed
                            • Instruction ID: 8ee1822582d9cf895539b70a9a43ea13fc6cc574ce80ec8dd7f32071c7effaea
                            • Opcode Fuzzy Hash: a280c3e6827662c4547a8dc763e1d818293d5ed18f5f6c4b512c2857c50330ed
                            • Instruction Fuzzy Hash: 9621E172635610CBC329CF29D841A52B3E1FBA5321B299E6CD0E6CB2D0CA74B945CB94
                            APIs
                            • BlockInput.USER32(00000001), ref: 00814218
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BlockInput
                            • String ID:
                            • API String ID: 3456056419-0
                            • Opcode ID: 952ff690f766390cf28c24a6d90bf8ef7f4e8fbadabdc95132fa251e8f7dd252
                            • Instruction ID: 10f9817b49f3cc27e74a16ec5b186543d17aeb732f8d0fdf720978e695b989d1
                            • Opcode Fuzzy Hash: 952ff690f766390cf28c24a6d90bf8ef7f4e8fbadabdc95132fa251e8f7dd252
                            • Instruction Fuzzy Hash: 50E012312401149FC7109F59D444A9AB7ECEF95760F008026F94AD7252DA74A881CBA0
                            APIs
                            • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00804EEC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: mouse_event
                            • String ID:
                            • API String ID: 2434400541-0
                            • Opcode ID: 5d6f96606c6fc60d7fc63965322e8e3f7d3724be43da08d03d592596c498757c
                            • Instruction ID: 0c4e86d7f4778d798bd38ee84b3ff8df0ed69fb16226bae56a78334e27f21904
                            • Opcode Fuzzy Hash: 5d6f96606c6fc60d7fc63965322e8e3f7d3724be43da08d03d592596c498757c
                            • Instruction Fuzzy Hash: 54D09EE91E060979EDE84B25DC5FF771109F3017A5FD4759AB302C90C2D8D56C559031
                            APIs
                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007F88D1), ref: 007F8CB3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: LogonUser
                            • String ID:
                            • API String ID: 1244722697-0
                            • Opcode ID: 8048ff4a112494e6edd2bdd4f8ff23f5f719dff44525c623361ebdef8607253c
                            • Instruction ID: 3a3d804ed25aefdb6314ae0ea8f20431f8f7498a5dc5fada94c355d2050643e8
                            • Opcode Fuzzy Hash: 8048ff4a112494e6edd2bdd4f8ff23f5f719dff44525c623361ebdef8607253c
                            • Instruction Fuzzy Hash: 6FD05E3226090EABEF018EA4DD01EAE3B69FB04B01F408121FE15D50A1C775D835EB60
                            APIs
                            • GetUserNameW.ADVAPI32(?,?), ref: 007E2242
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID:
                            • API String ID: 2645101109-0
                            • Opcode ID: fa2e38dc1a1a9dd0c3c4b95aa5b4a1bc62411d5e45473ee1fa961f69dc8d69bd
                            • Instruction ID: 37d0c27758260d92e1b789bf0526847db4f74ccc12acb82acd018c500b8099de
                            • Opcode Fuzzy Hash: fa2e38dc1a1a9dd0c3c4b95aa5b4a1bc62411d5e45473ee1fa961f69dc8d69bd
                            • Instruction Fuzzy Hash: 61C04CF1801109DBDB15DB90D988DEF77BCBB08304F104065A101F2101D7749B44CA71
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 007CA36A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: b1cd9af12710fe748110f486cdb9e2377aa50c138826c3fb76da5c40c12c7aca
                            • Instruction ID: d2ae1b4052f1af92b7201d9b41c0ce03b6da2a74cca3f3db59e6518ee48f27dd
                            • Opcode Fuzzy Hash: b1cd9af12710fe748110f486cdb9e2377aa50c138826c3fb76da5c40c12c7aca
                            • Instruction Fuzzy Hash: C9A0113000020CEB8A002B82EC08888BFACEA002A0B008030FA0C802228B32A8228A80
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 63d6b7a6f68be39bf4af5fc16053aef71ea3c26c491e83989efca16757845f5d
                            • Instruction ID: 8094c57d2d98e9eed1f36f9ee339ebb8afd57d1528cdf4b7df9bcc0beabf221b
                            • Opcode Fuzzy Hash: 63d6b7a6f68be39bf4af5fc16053aef71ea3c26c491e83989efca16757845f5d
                            • Instruction Fuzzy Hash: EC225BB0505619DBCF688B28C4947FD7BA5FF01304F2884AAD6528B291DB3CDD81CBB2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                            • Instruction ID: 48d6dbe9e15d13a5e17a06f60e403b71aa050633a06a11a38537253fdf792c02
                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                            • Instruction Fuzzy Hash: 1DC1B63220609309DF2D4639D474A3EBBE15AA37B135A0B6DE4B3DB4C6EF18D535D620
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                            • Instruction ID: 0c1b07bdf33485985422e1c654a4068151040fe21aec4e3a263fae364a825cde
                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                            • Instruction Fuzzy Hash: 73C1B63220519309DF2D4639C434A3EBBE15AA37B135A0B6DE4B2DB4D6EF28D535E620
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                            • Instruction ID: 5094c66a419e853df4879dd0b4c152918967cbd467c40f1aebe49b72b8e888d4
                            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                            • Instruction Fuzzy Hash: D741B3B1D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                            • Instruction ID: c01902537261c1ba20f8ef79c18e31cd321c7fe2d2213102acddac7bf863ee1c
                            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                            • Instruction Fuzzy Hash: 32019278A04209EFCB44DF98D5909AEF7B5FB48310F20859AE819A7701E730EE41DB91
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                            • Instruction ID: 5ca5e3325b74f545e63d73f88b562c2a2807ec62a14079358deea28a9b5c86b7
                            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                            • Instruction Fuzzy Hash: 6F019278A05109EFCB84DF98C5909AEF7B5FB48310F24859AE819A7701D734AE41DB91
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709954547.0000000000DD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00DD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_dd0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 00817B70
                            • DeleteObject.GDI32(00000000), ref: 00817B82
                            • DestroyWindow.USER32 ref: 00817B90
                            • GetDesktopWindow.USER32 ref: 00817BAA
                            • GetWindowRect.USER32(00000000), ref: 00817BB1
                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00817CF2
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00817D02
                            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817D4A
                            • GetClientRect.USER32(00000000,?), ref: 00817D56
                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00817D90
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817DB2
                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817DC5
                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817DD0
                            • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817DD9
                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817DE8
                            • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817DF1
                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817DF8
                            • GlobalFree.KERNEL32(00000000), ref: 00817E03
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817E15
                            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00832CAC,00000000), ref: 00817E2B
                            • GlobalFree.KERNEL32(00000000), ref: 00817E3B
                            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00817E61
                            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00817E80
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00817EA2
                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0081808F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                            • String ID: $AutoIt v3$DISPLAY$static
                            • API String ID: 2211948467-2373415609
                            • Opcode ID: 320d2cbfdfddd10b937fdcfde98b3e047375bde06358c849e10624633059f3ce
                            • Instruction ID: 57a5131db293470993b1ff54be116dcf69f29d2cc085cb5d6c114a1a9edf4442
                            • Opcode Fuzzy Hash: 320d2cbfdfddd10b937fdcfde98b3e047375bde06358c849e10624633059f3ce
                            • Instruction Fuzzy Hash: F3025771900119EFDB149FA4CD89EAE7BB9FF49310F108168FA15EB2A1DB74AD41CB60
                            APIs
                            • CharUpperBuffW.USER32(?,?,0082F910), ref: 008238AF
                            • IsWindowVisible.USER32(?), ref: 008238D3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharUpperVisibleWindow
                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                            • API String ID: 4105515805-45149045
                            • Opcode ID: eb3fb64a241dd314edfae160140c6c349608985cce5657dbf6eb84a75725858c
                            • Instruction ID: c1b62a254341a0ef35b0fa10a05aa4b72e1787bab9cb8898747f1e44e55b727a
                            • Opcode Fuzzy Hash: eb3fb64a241dd314edfae160140c6c349608985cce5657dbf6eb84a75725858c
                            • Instruction Fuzzy Hash: AAD1A730204319DBCB14EF60D465B6E77A5FF95354F00446CB9869B3A2DB39EE8ACB81
                            APIs
                            • SetTextColor.GDI32(?,00000000), ref: 0082A89F
                            • GetSysColorBrush.USER32(0000000F), ref: 0082A8D0
                            • GetSysColor.USER32(0000000F), ref: 0082A8DC
                            • SetBkColor.GDI32(?,000000FF), ref: 0082A8F6
                            • SelectObject.GDI32(?,?), ref: 0082A905
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0082A930
                            • GetSysColor.USER32(00000010), ref: 0082A938
                            • CreateSolidBrush.GDI32(00000000), ref: 0082A93F
                            • FrameRect.USER32(?,?,00000000), ref: 0082A94E
                            • DeleteObject.GDI32(00000000), ref: 0082A955
                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0082A9A0
                            • FillRect.USER32(?,?,?), ref: 0082A9D2
                            • GetWindowLongW.USER32(?,000000F0), ref: 0082A9FD
                              • Part of subcall function 0082AB60: GetSysColor.USER32(00000012), ref: 0082AB99
                              • Part of subcall function 0082AB60: SetTextColor.GDI32(?,?), ref: 0082AB9D
                              • Part of subcall function 0082AB60: GetSysColorBrush.USER32(0000000F), ref: 0082ABB3
                              • Part of subcall function 0082AB60: GetSysColor.USER32(0000000F), ref: 0082ABBE
                              • Part of subcall function 0082AB60: GetSysColor.USER32(00000011), ref: 0082ABDB
                              • Part of subcall function 0082AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0082ABE9
                              • Part of subcall function 0082AB60: SelectObject.GDI32(?,00000000), ref: 0082ABFA
                              • Part of subcall function 0082AB60: SetBkColor.GDI32(?,00000000), ref: 0082AC03
                              • Part of subcall function 0082AB60: SelectObject.GDI32(?,?), ref: 0082AC10
                              • Part of subcall function 0082AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 0082AC2F
                              • Part of subcall function 0082AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0082AC46
                              • Part of subcall function 0082AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 0082AC5B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                            • String ID:
                            • API String ID: 4124339563-0
                            • Opcode ID: bb71a252fb8148903821a37fe7f580c0c044a73bf17f69c81184683c0887ee8b
                            • Instruction ID: 29bc64cf7139745a4fb700c24c4cd8cb9db19ab6e15c64536913a6263c1d9a15
                            • Opcode Fuzzy Hash: bb71a252fb8148903821a37fe7f580c0c044a73bf17f69c81184683c0887ee8b
                            • Instruction Fuzzy Hash: 8EA17E71008311AFD7259F64DD08E6B7BB9FF88321F108A39FA62D61A1D735D885CB52
                            APIs
                            • DestroyWindow.USER32(?,?,?), ref: 007A2CA2
                            • DeleteObject.GDI32(00000000), ref: 007A2CE8
                            • DeleteObject.GDI32(00000000), ref: 007A2CF3
                            • DestroyIcon.USER32(00000000,?,?,?), ref: 007A2CFE
                            • DestroyWindow.USER32(00000000,?,?,?), ref: 007A2D09
                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 007DC68B
                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007DC6C4
                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007DCAED
                              • Part of subcall function 007A1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A2036,?,00000000,?,?,?,?,007A16CB,00000000,?), ref: 007A1B9A
                            • SendMessageW.USER32(?,00001053), ref: 007DCB2A
                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007DCB41
                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 007DCB57
                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 007DCB62
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                            • String ID: 0
                            • API String ID: 464785882-4108050209
                            • Opcode ID: fd3c86dab0818484e38c3b08e32979f3ce61ba002246892ab72f0c00244950a8
                            • Instruction ID: 4b1a83c25f93ff0d84c66937528514bc760f202ca9b62a37214b2f216b7344e7
                            • Opcode Fuzzy Hash: fd3c86dab0818484e38c3b08e32979f3ce61ba002246892ab72f0c00244950a8
                            • Instruction Fuzzy Hash: 9B129030604202EFDB22CF28C988BA9B7F5BF45310F54867AE955DB662C739EC42DB51
                            APIs
                            • DestroyWindow.USER32(00000000), ref: 008177F1
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 008178B0
                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 008178EE
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00817900
                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00817946
                            • GetClientRect.USER32(00000000,?), ref: 00817952
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00817996
                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 008179A5
                            • GetStockObject.GDI32(00000011), ref: 008179B5
                            • SelectObject.GDI32(00000000,00000000), ref: 008179B9
                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 008179C9
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008179D2
                            • DeleteDC.GDI32(00000000), ref: 008179DB
                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00817A07
                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00817A1E
                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00817A59
                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00817A6D
                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00817A7E
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00817AAE
                            • GetStockObject.GDI32(00000011), ref: 00817AB9
                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00817AC4
                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00817ACE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                            • API String ID: 2910397461-517079104
                            • Opcode ID: ab50cd0715fe1d87489eccc42463cc13a9d223ababa777b07114682b15c44757
                            • Instruction ID: 437b829ac734c12cc78a4ddcb28cc6967f8d4aed7d41e832f42fbda0e7ac3e7c
                            • Opcode Fuzzy Hash: ab50cd0715fe1d87489eccc42463cc13a9d223ababa777b07114682b15c44757
                            • Instruction Fuzzy Hash: 5DA18171A00215BFEB149B64DC4AFAA7BB9FF44710F008228FA14E72E1D7B4AD51CB64
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0080AF89
                            • GetDriveTypeW.KERNEL32(?,0082FAC0,?,\\.\,0082F910), ref: 0080B066
                            • SetErrorMode.KERNEL32(00000000,0082FAC0,?,\\.\,0082F910), ref: 0080B1C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorMode$DriveType
                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                            • API String ID: 2907320926-4222207086
                            • Opcode ID: 81a299815fd9cd1fb478bc71543e6dc76d8e38616d6384acb7fef666a0495607
                            • Instruction ID: ce42794da62541d578a3811ddfa09c41ccae816be0662d9e51c86fcbfc5729e8
                            • Opcode Fuzzy Hash: 81a299815fd9cd1fb478bc71543e6dc76d8e38616d6384acb7fef666a0495607
                            • Instruction Fuzzy Hash: 1D51C230681709EBCB88DB10CDA2C7D77B0FB5A746B208215E92AE73D1DB399D45CB42
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                            • API String ID: 1038674560-86951937
                            • Opcode ID: dc54a9858afd182a9b2aa865eedb470f4754a3fe885c7fcfd3224b0597a82ec9
                            • Instruction ID: 989b69172d431ad41114a19447d44f7fe6a7c977cfd978cea5df6715551c3637
                            • Opcode Fuzzy Hash: dc54a9858afd182a9b2aa865eedb470f4754a3fe885c7fcfd3224b0597a82ec9
                            • Instruction Fuzzy Hash: 4D812EB0640215FACB15BB20CC87FAF7768EF52700F148129FD45EE282EB6CDA51C2A1
                            APIs
                            • GetSysColor.USER32(00000012), ref: 0082AB99
                            • SetTextColor.GDI32(?,?), ref: 0082AB9D
                            • GetSysColorBrush.USER32(0000000F), ref: 0082ABB3
                            • GetSysColor.USER32(0000000F), ref: 0082ABBE
                            • CreateSolidBrush.GDI32(?), ref: 0082ABC3
                            • GetSysColor.USER32(00000011), ref: 0082ABDB
                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0082ABE9
                            • SelectObject.GDI32(?,00000000), ref: 0082ABFA
                            • SetBkColor.GDI32(?,00000000), ref: 0082AC03
                            • SelectObject.GDI32(?,?), ref: 0082AC10
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0082AC2F
                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0082AC46
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0082AC5B
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0082ACA7
                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0082ACCE
                            • InflateRect.USER32(?,000000FD,000000FD), ref: 0082ACEC
                            • DrawFocusRect.USER32(?,?), ref: 0082ACF7
                            • GetSysColor.USER32(00000011), ref: 0082AD05
                            • SetTextColor.GDI32(?,00000000), ref: 0082AD0D
                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0082AD21
                            • SelectObject.GDI32(?,0082A869), ref: 0082AD38
                            • DeleteObject.GDI32(?), ref: 0082AD43
                            • SelectObject.GDI32(?,?), ref: 0082AD49
                            • DeleteObject.GDI32(?), ref: 0082AD4E
                            • SetTextColor.GDI32(?,?), ref: 0082AD54
                            • SetBkColor.GDI32(?,?), ref: 0082AD5E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                            • String ID:
                            • API String ID: 1996641542-0
                            • Opcode ID: 95939747b0bf44a4f8ec7e7d974c623064f245851c8f3556850b843a9c97732e
                            • Instruction ID: d165343c1575574f2ac8dd1994f1c1da5d3dbec47354f344c83300e37e0c8975
                            • Opcode Fuzzy Hash: 95939747b0bf44a4f8ec7e7d974c623064f245851c8f3556850b843a9c97732e
                            • Instruction Fuzzy Hash: C9613C71900218EFDB259FA4DC48EAE7B79FF08720F108126FA15AB2A2D7759941DF90
                            APIs
                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00828D34
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00828D45
                            • CharNextW.USER32(0000014E), ref: 00828D74
                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00828DB5
                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00828DCB
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00828DDC
                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00828DF9
                            • SetWindowTextW.USER32(?,0000014E), ref: 00828E45
                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00828E5B
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00828E8C
                            • _memset.LIBCMT ref: 00828EB1
                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00828EFA
                            • _memset.LIBCMT ref: 00828F59
                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00828F83
                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00828FDB
                            • SendMessageW.USER32(?,0000133D,?,?), ref: 00829088
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 008290AA
                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 008290F4
                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00829121
                            • DrawMenuBar.USER32(?), ref: 00829130
                            • SetWindowTextW.USER32(?,0000014E), ref: 00829158
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                            • String ID: 0
                            • API String ID: 1073566785-4108050209
                            • Opcode ID: a5ab23f2181fcb6036a09d9e611cc9b71910e68ff46e27f4bbf16097ffedfb55
                            • Instruction ID: bfa1302a96d0be40edff6df37d69f6252032be19302632db4565b2af1576e65d
                            • Opcode Fuzzy Hash: a5ab23f2181fcb6036a09d9e611cc9b71910e68ff46e27f4bbf16097ffedfb55
                            • Instruction Fuzzy Hash: A3E19170901229EBDF209F51DC88EEE7BB9FF05714F00816AF915EA291DB748A85DF60
                            APIs
                            • GetCursorPos.USER32(?), ref: 00824C51
                            • GetDesktopWindow.USER32 ref: 00824C66
                            • GetWindowRect.USER32(00000000), ref: 00824C6D
                            • GetWindowLongW.USER32(?,000000F0), ref: 00824CCF
                            • DestroyWindow.USER32(?), ref: 00824CFB
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00824D24
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00824D42
                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00824D68
                            • SendMessageW.USER32(?,00000421,?,?), ref: 00824D7D
                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00824D90
                            • IsWindowVisible.USER32(?), ref: 00824DB0
                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00824DCB
                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00824DDF
                            • GetWindowRect.USER32(?,?), ref: 00824DF7
                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00824E1D
                            • GetMonitorInfoW.USER32(00000000,?), ref: 00824E37
                            • CopyRect.USER32(?,?), ref: 00824E4E
                            • SendMessageW.USER32(?,00000412,00000000), ref: 00824EB9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                            • String ID: ($0$tooltips_class32
                            • API String ID: 698492251-4156429822
                            • Opcode ID: 9b441015f0715b0ed83e0de570742c7a2c837f6e307e7390dae15081313363a6
                            • Instruction ID: 071268e0c1f0ac05f4a7ef91f34e54f334c8e43bf077b6e870cfd97d848e438f
                            • Opcode Fuzzy Hash: 9b441015f0715b0ed83e0de570742c7a2c837f6e307e7390dae15081313363a6
                            • Instruction Fuzzy Hash: 52B19971604310AFDB14DF68D848B6ABBE4FF88310F008A2CF5999B2A1D770EC45CBA1
                            APIs
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A28BC
                            • GetSystemMetrics.USER32(00000007), ref: 007A28C4
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A28EF
                            • GetSystemMetrics.USER32(00000008), ref: 007A28F7
                            • GetSystemMetrics.USER32(00000004), ref: 007A291C
                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007A2939
                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007A2949
                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007A297C
                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007A2990
                            • GetClientRect.USER32(00000000,000000FF), ref: 007A29AE
                            • GetStockObject.GDI32(00000011), ref: 007A29CA
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 007A29D5
                              • Part of subcall function 007A2344: GetCursorPos.USER32(?), ref: 007A2357
                              • Part of subcall function 007A2344: ScreenToClient.USER32(008667B0,?), ref: 007A2374
                              • Part of subcall function 007A2344: GetAsyncKeyState.USER32(00000001), ref: 007A2399
                              • Part of subcall function 007A2344: GetAsyncKeyState.USER32(00000002), ref: 007A23A7
                            • SetTimer.USER32(00000000,00000000,00000028,007A1256), ref: 007A29FC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                            • String ID: AutoIt v3 GUI
                            • API String ID: 1458621304-248962490
                            • Opcode ID: 906401cbadde163b718e5a15b2e4d2769e2a3e644c80637cfa82e7f57e94b139
                            • Instruction ID: 0c327c119d1741fab16850f3afd0561ae4c258b6e5e3dafb3ed6446435262898
                            • Opcode Fuzzy Hash: 906401cbadde163b718e5a15b2e4d2769e2a3e644c80637cfa82e7f57e94b139
                            • Instruction Fuzzy Hash: 12B19E71A0020AEFDB14DFA8DD45BAE7BB4FB48310F118229FA15E7291DB78D852CB50
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 008240F6
                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008241B6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharMessageSendUpper
                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                            • API String ID: 3974292440-719923060
                            • Opcode ID: cfd81ad879172ff4fc039d757948775fc62d4754281416b8b6d51e6522726d00
                            • Instruction ID: 459719554e5949f1cd6ea264f0f2ab451fdd63c297fe8f5ee3bf2718b181f622
                            • Opcode Fuzzy Hash: cfd81ad879172ff4fc039d757948775fc62d4754281416b8b6d51e6522726d00
                            • Instruction Fuzzy Hash: 5EA1CD30214315DBCB14EF20D849E6AB3A5FF95314F10896CB996DB392EB34ED49CBA1
                            APIs
                            • LoadCursorW.USER32(00000000,00007F89), ref: 00815309
                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00815314
                            • LoadCursorW.USER32(00000000,00007F00), ref: 0081531F
                            • LoadCursorW.USER32(00000000,00007F03), ref: 0081532A
                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00815335
                            • LoadCursorW.USER32(00000000,00007F01), ref: 00815340
                            • LoadCursorW.USER32(00000000,00007F81), ref: 0081534B
                            • LoadCursorW.USER32(00000000,00007F88), ref: 00815356
                            • LoadCursorW.USER32(00000000,00007F80), ref: 00815361
                            • LoadCursorW.USER32(00000000,00007F86), ref: 0081536C
                            • LoadCursorW.USER32(00000000,00007F83), ref: 00815377
                            • LoadCursorW.USER32(00000000,00007F85), ref: 00815382
                            • LoadCursorW.USER32(00000000,00007F82), ref: 0081538D
                            • LoadCursorW.USER32(00000000,00007F84), ref: 00815398
                            • LoadCursorW.USER32(00000000,00007F04), ref: 008153A3
                            • LoadCursorW.USER32(00000000,00007F02), ref: 008153AE
                            • GetCursorInfo.USER32(?), ref: 008153BE
                            • GetLastError.KERNEL32(00000001,00000000), ref: 008153E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Cursor$Load$ErrorInfoLast
                            • String ID:
                            • API String ID: 3215588206-0
                            • Opcode ID: 158397cb47b3a6126bb5f92648fea04b26881a935a33275aa75cec203ce5be2b
                            • Instruction ID: a2dc680d8a15880f37cf9deb79b68d842bf407c0d20a57682a1283da168c32fc
                            • Opcode Fuzzy Hash: 158397cb47b3a6126bb5f92648fea04b26881a935a33275aa75cec203ce5be2b
                            • Instruction Fuzzy Hash: 3B418470E04319AADB109FB68C498AEFFFCFF81B10B10452FE519E7291DAB89441CE55
                            APIs
                            • GetClassNameW.USER32(?,?,00000100), ref: 007FAAA5
                            • __swprintf.LIBCMT ref: 007FAB46
                            • _wcscmp.LIBCMT ref: 007FAB59
                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007FABAE
                            • _wcscmp.LIBCMT ref: 007FABEA
                            • GetClassNameW.USER32(?,?,00000400), ref: 007FAC21
                            • GetDlgCtrlID.USER32(?), ref: 007FAC73
                            • GetWindowRect.USER32(?,?), ref: 007FACA9
                            • GetParent.USER32(?), ref: 007FACC7
                            • ScreenToClient.USER32(00000000), ref: 007FACCE
                            • GetClassNameW.USER32(?,?,00000100), ref: 007FAD48
                            • _wcscmp.LIBCMT ref: 007FAD5C
                            • GetWindowTextW.USER32(?,?,00000400), ref: 007FAD82
                            • _wcscmp.LIBCMT ref: 007FAD96
                              • Part of subcall function 007C386C: _iswctype.LIBCMT ref: 007C3874
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                            • String ID: %s%u
                            • API String ID: 3744389584-679674701
                            • Opcode ID: fc103a5b7a714d09f5b22fdd21a8bb9b8fa62fddab8c327baafdef6b0b645e94
                            • Instruction ID: ecfc7e9771584bdd0911c05bae99c19f085ffb3b6305c5eb82f0430b27c87b74
                            • Opcode Fuzzy Hash: fc103a5b7a714d09f5b22fdd21a8bb9b8fa62fddab8c327baafdef6b0b645e94
                            • Instruction Fuzzy Hash: 81A19FB120460ABBD714DF64C884FBAB7E8FF44315F008629EA9DD2651D738E945CBA2
                            APIs
                            • GetClassNameW.USER32(00000008,?,00000400), ref: 007FB3DB
                            • _wcscmp.LIBCMT ref: 007FB3EC
                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 007FB414
                            • CharUpperBuffW.USER32(?,00000000), ref: 007FB431
                            • _wcscmp.LIBCMT ref: 007FB44F
                            • _wcsstr.LIBCMT ref: 007FB460
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 007FB498
                            • _wcscmp.LIBCMT ref: 007FB4A8
                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 007FB4CF
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 007FB518
                            • _wcscmp.LIBCMT ref: 007FB528
                            • GetClassNameW.USER32(00000010,?,00000400), ref: 007FB550
                            • GetWindowRect.USER32(00000004,?), ref: 007FB5B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                            • String ID: @$ThumbnailClass
                            • API String ID: 1788623398-1539354611
                            • Opcode ID: c03921030253c07ba37a222fc04cce7b71a5ce94bd3cf60f32e6e4c667f723e3
                            • Instruction ID: f0266c5f3a4b83ff9aa04064fc169e426f65e5ad64816f6ac3fe0ac228e6c212
                            • Opcode Fuzzy Hash: c03921030253c07ba37a222fc04cce7b71a5ce94bd3cf60f32e6e4c667f723e3
                            • Instruction Fuzzy Hash: 8081BE710082499FDB14DF10C985FBA7BE8FF44314F088569FE859A292DB38DD4ACB61
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                            • API String ID: 1038674560-1810252412
                            • Opcode ID: 86a2ec7dc2dd8cffb9a138f4f371cbf0e095a05616f525c3a65a85236a0171d7
                            • Instruction ID: c2861026d0dd73211becbb69e8eb43a0c21fa6e794de3992f2aa51c3d8c95064
                            • Opcode Fuzzy Hash: 86a2ec7dc2dd8cffb9a138f4f371cbf0e095a05616f525c3a65a85236a0171d7
                            • Instruction Fuzzy Hash: E531E131A44209E6DB14FA60CD47EFE77A8FF24751F604229F9A1B12D2EF2D6E08C591
                            APIs
                            • LoadIconW.USER32(00000063), ref: 007FC4D4
                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007FC4E6
                            • SetWindowTextW.USER32(?,?), ref: 007FC4FD
                            • GetDlgItem.USER32(?,000003EA), ref: 007FC512
                            • SetWindowTextW.USER32(00000000,?), ref: 007FC518
                            • GetDlgItem.USER32(?,000003E9), ref: 007FC528
                            • SetWindowTextW.USER32(00000000,?), ref: 007FC52E
                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007FC54F
                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007FC569
                            • GetWindowRect.USER32(?,?), ref: 007FC572
                            • SetWindowTextW.USER32(?,?), ref: 007FC5DD
                            • GetDesktopWindow.USER32 ref: 007FC5E3
                            • GetWindowRect.USER32(00000000), ref: 007FC5EA
                            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 007FC636
                            • GetClientRect.USER32(?,?), ref: 007FC643
                            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 007FC668
                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007FC693
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                            • String ID:
                            • API String ID: 3869813825-0
                            • Opcode ID: 2eac11f850cd04f38327b4519f2713b8c5a75840f64e16602f1ba6e4f59f5d0d
                            • Instruction ID: 934c16a243b7756c31aeadf2dab4e2ccdb10c2b82c081988b9fa0eba02979c49
                            • Opcode Fuzzy Hash: 2eac11f850cd04f38327b4519f2713b8c5a75840f64e16602f1ba6e4f59f5d0d
                            • Instruction Fuzzy Hash: AA516C7090070DEFDB219FA8DE89B7EBBB5FF04704F104928E686A26A1C774A915CB50
                            APIs
                            • _memset.LIBCMT ref: 0082A4C8
                            • DestroyWindow.USER32(?,?), ref: 0082A542
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0082A5BC
                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0082A5DE
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0082A5F1
                            • DestroyWindow.USER32(00000000), ref: 0082A613
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,007A0000,00000000), ref: 0082A64A
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0082A663
                            • GetDesktopWindow.USER32 ref: 0082A67C
                            • GetWindowRect.USER32(00000000), ref: 0082A683
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0082A69B
                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0082A6B3
                              • Part of subcall function 007A25DB: GetWindowLongW.USER32(?,000000EB), ref: 007A25EC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                            • String ID: 0$tooltips_class32
                            • API String ID: 1297703922-3619404913
                            • Opcode ID: b72adc76bf0f202035cd3683d08390559917775034407ba513592e0c1f3bdef2
                            • Instruction ID: 3c70067686a61a7624af10f1497dac3d552a4bb2985ec2a4e83c850eb1e11bce
                            • Opcode Fuzzy Hash: b72adc76bf0f202035cd3683d08390559917775034407ba513592e0c1f3bdef2
                            • Instruction Fuzzy Hash: CE71B971100245AFD724CF28DC49F667BEAFBA8300F08492CF985D72A1D7B5E986CB52
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • DragQueryPoint.SHELL32(?,?), ref: 0082C917
                              • Part of subcall function 0082ADF1: ClientToScreen.USER32(?,?), ref: 0082AE1A
                              • Part of subcall function 0082ADF1: GetWindowRect.USER32(?,?), ref: 0082AE90
                              • Part of subcall function 0082ADF1: PtInRect.USER32(?,?,0082C304), ref: 0082AEA0
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0082C980
                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0082C98B
                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0082C9AE
                            • _wcscat.LIBCMT ref: 0082C9DE
                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0082C9F5
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0082CA0E
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0082CA25
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0082CA47
                            • DragFinish.SHELL32(?), ref: 0082CA4E
                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0082CB41
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                            • API String ID: 169749273-3440237614
                            • Opcode ID: d72d354c432b7e138eecf3777addf831120a5e8daad1ab57736d8089d90391a7
                            • Instruction ID: a75e871ce29441c3b70f32ea98faf770610460d749a83018dd40a4bbea65f077
                            • Opcode Fuzzy Hash: d72d354c432b7e138eecf3777addf831120a5e8daad1ab57736d8089d90391a7
                            • Instruction Fuzzy Hash: 43613C71108310AFC711EF64DC89D9FBBF8FB99710F004A2DF691961A1EB749A49CB52
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 008246AB
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008246F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharMessageSendUpper
                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                            • API String ID: 3974292440-4258414348
                            • Opcode ID: 05981303be004e092b053a3d89a38ad5d4dfb9d14a17fefb27c82390ff824072
                            • Instruction ID: 09c13d2e3ef93065875aefcba773bbaa527a309678525a2c58a3e6ddc7ec48d4
                            • Opcode Fuzzy Hash: 05981303be004e092b053a3d89a38ad5d4dfb9d14a17fefb27c82390ff824072
                            • Instruction Fuzzy Hash: 3991BE34204315DFCB14EF20C455A6ABBA1FF95314F00856CF9969B3A2DB38ED9ACB91
                            APIs
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0082BB6E
                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00826D80,?), ref: 0082BBCA
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0082BC03
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0082BC46
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0082BC7D
                            • FreeLibrary.KERNEL32(?), ref: 0082BC89
                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0082BC99
                            • DestroyIcon.USER32(?), ref: 0082BCA8
                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0082BCC5
                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0082BCD1
                              • Part of subcall function 007C313D: __wcsicmp_l.LIBCMT ref: 007C31C6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                            • String ID: .dll$.exe$.icl
                            • API String ID: 1212759294-1154884017
                            • Opcode ID: 520f1e0740b13b7eb395684cca5b3d1268787c38887d12e55bd25fb703970c10
                            • Instruction ID: aed34c6f9fdfc8faef93348afabf29f53f2e97e0c98c708e4822c23f0cd02e5b
                            • Opcode Fuzzy Hash: 520f1e0740b13b7eb395684cca5b3d1268787c38887d12e55bd25fb703970c10
                            • Instruction Fuzzy Hash: 5861DF71500629FEEB24DF64DC45FBA77B8FB08720F108229F915E61D1DB78A991CBA0
                            APIs
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • CharLowerBuffW.USER32(?,?), ref: 0080A636
                            • GetDriveTypeW.KERNEL32 ref: 0080A683
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0080A6CB
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0080A702
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0080A730
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                            • API String ID: 2698844021-4113822522
                            • Opcode ID: 5550555bfcb09a4a859c0fe6457a3d746a7a75730795e0ad14b9fba5e243d3e9
                            • Instruction ID: 7afe038145b22839a6aabb012f7dcaff2364758103aa9bdfd9a49995fd448c5f
                            • Opcode Fuzzy Hash: 5550555bfcb09a4a859c0fe6457a3d746a7a75730795e0ad14b9fba5e243d3e9
                            • Instruction Fuzzy Hash: 35511871104305DFC704EF20C88596AB7E8FF95718F048A6DF896972A1DB35AE0ACB92
                            APIs
                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0080A47A
                            • __swprintf.LIBCMT ref: 0080A49C
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0080A4D9
                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0080A4FE
                            • _memset.LIBCMT ref: 0080A51D
                            • _wcsncpy.LIBCMT ref: 0080A559
                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0080A58E
                            • CloseHandle.KERNEL32(00000000), ref: 0080A599
                            • RemoveDirectoryW.KERNEL32(?), ref: 0080A5A2
                            • CloseHandle.KERNEL32(00000000), ref: 0080A5AC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                            • String ID: :$\$\??\%s
                            • API String ID: 2733774712-3457252023
                            • Opcode ID: de2a61498225f88a71e1e8e06b95f8ad545d226ac1bf0d324ee9fb9f1e81352e
                            • Instruction ID: 2cef97d4ce50010859909ee5a9e4bd4cc3e4f23979490a245c3e2f43399bf499
                            • Opcode Fuzzy Hash: de2a61498225f88a71e1e8e06b95f8ad545d226ac1bf0d324ee9fb9f1e81352e
                            • Instruction Fuzzy Hash: C8318EB6500209ABDB21DFA0DC49FEB73BCFF89701F1041BAFA08D21A1E67496458B25
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                            • String ID:
                            • API String ID: 884005220-0
                            • Opcode ID: d0b48e4430104462c8d629e66a4a4b8b0a3a787fc1e6d018e0a8405f86a87298
                            • Instruction ID: f43c0bd14c23c7a9c1e7bf43478e206c4515bd67611c042072674060e05443fb
                            • Opcode Fuzzy Hash: d0b48e4430104462c8d629e66a4a4b8b0a3a787fc1e6d018e0a8405f86a87298
                            • Instruction Fuzzy Hash: 4061D1B2900305FFDB215F24D845B6D7BBAFB12321F24511FE8059B391DB7D988287A2
                            APIs
                            • __wsplitpath.LIBCMT ref: 0080DC7B
                            • _wcscat.LIBCMT ref: 0080DC93
                            • _wcscat.LIBCMT ref: 0080DCA5
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0080DCBA
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0080DCCE
                            • GetFileAttributesW.KERNEL32(?), ref: 0080DCE6
                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 0080DD00
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0080DD12
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                            • String ID: *.*
                            • API String ID: 34673085-438819550
                            • Opcode ID: 4a5128127e7458aaf88a15327ce78d6aa33c7d1cdf5ed99f6044045df31a143b
                            • Instruction ID: 8aedac069a80fbdad2d1b931df35242c588cbc0746c5e72746ca8775aee55b2b
                            • Opcode Fuzzy Hash: 4a5128127e7458aaf88a15327ce78d6aa33c7d1cdf5ed99f6044045df31a143b
                            • Instruction Fuzzy Hash: 9D81B0715043449FCBA0DFA4CC559AAB7E8FF89314F15882EF889C7291E734D945CB52
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0082C4EC
                            • GetFocus.USER32 ref: 0082C4FC
                            • GetDlgCtrlID.USER32(00000000), ref: 0082C507
                            • _memset.LIBCMT ref: 0082C632
                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0082C65D
                            • GetMenuItemCount.USER32(?), ref: 0082C67D
                            • GetMenuItemID.USER32(?,00000000), ref: 0082C690
                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0082C6C4
                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0082C70C
                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0082C744
                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0082C779
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                            • String ID: 0
                            • API String ID: 1296962147-4108050209
                            • Opcode ID: f801b1bfbcfbc6483398c5a2042a358de95b4246915deb6fc6d31529923b6f62
                            • Instruction ID: f054d84c72c02389f0045b52b71242276e455c004daed3f08a9ed73cc4e5fd41
                            • Opcode Fuzzy Hash: f801b1bfbcfbc6483398c5a2042a358de95b4246915deb6fc6d31529923b6f62
                            • Instruction Fuzzy Hash: 0A816A70208321AFD720CF28E984A7EBBE9FB98354F00452DF995D3291D771D985CBA2
                            APIs
                              • Part of subcall function 007F874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F8766
                              • Part of subcall function 007F874A: GetLastError.KERNEL32(?,007F822A,?,?,?), ref: 007F8770
                              • Part of subcall function 007F874A: GetProcessHeap.KERNEL32(00000008,?,?,007F822A,?,?,?), ref: 007F877F
                              • Part of subcall function 007F874A: HeapAlloc.KERNEL32(00000000,?,007F822A,?,?,?), ref: 007F8786
                              • Part of subcall function 007F874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F879D
                              • Part of subcall function 007F87E7: GetProcessHeap.KERNEL32(00000008,007F8240,00000000,00000000,?,007F8240,?), ref: 007F87F3
                              • Part of subcall function 007F87E7: HeapAlloc.KERNEL32(00000000,?,007F8240,?), ref: 007F87FA
                              • Part of subcall function 007F87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,007F8240,?), ref: 007F880B
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F8458
                            • _memset.LIBCMT ref: 007F846D
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F848C
                            • GetLengthSid.ADVAPI32(?), ref: 007F849D
                            • GetAce.ADVAPI32(?,00000000,?), ref: 007F84DA
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F84F6
                            • GetLengthSid.ADVAPI32(?), ref: 007F8513
                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 007F8522
                            • HeapAlloc.KERNEL32(00000000), ref: 007F8529
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F854A
                            • CopySid.ADVAPI32(00000000), ref: 007F8551
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F8582
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F85A8
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F85BC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                            • String ID:
                            • API String ID: 3996160137-0
                            • Opcode ID: a03ca1f41767da2281b1072a3ffab3e2c8061d1c547416867224951479e07cc1
                            • Instruction ID: eabf281ba45657b44836acc21a96f1ae0bac2367c3926993c86574aa91ccc725
                            • Opcode Fuzzy Hash: a03ca1f41767da2281b1072a3ffab3e2c8061d1c547416867224951479e07cc1
                            • Instruction Fuzzy Hash: 6D613871A00209EBDF10DFA4DC45EBEBBB9FF05300F148169EA15AB292DB359A15CF61
                            APIs
                            • GetDC.USER32(00000000), ref: 008176A2
                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 008176AE
                            • CreateCompatibleDC.GDI32(?), ref: 008176BA
                            • SelectObject.GDI32(00000000,?), ref: 008176C7
                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0081771B
                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00817757
                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0081777B
                            • SelectObject.GDI32(00000006,?), ref: 00817783
                            • DeleteObject.GDI32(?), ref: 0081778C
                            • DeleteDC.GDI32(00000006), ref: 00817793
                            • ReleaseDC.USER32(00000000,?), ref: 0081779E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                            • String ID: (
                            • API String ID: 2598888154-3887548279
                            • Opcode ID: a1ea5854d2b34306a534b85187e4891b0227a0763544275ca800a09cb36e783a
                            • Instruction ID: d71a554c2f769ad954db7d34b551738690278b1113ccce3bbdb6eaf04d5c675f
                            • Opcode Fuzzy Hash: a1ea5854d2b34306a534b85187e4891b0227a0763544275ca800a09cb36e783a
                            • Instruction Fuzzy Hash: 6F514875904609EFCB25CFA8CC84EAEBBB9FF48710F14852DFA4A97251D731A941CB60
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,0082FB78), ref: 0080A0FC
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                            • LoadStringW.USER32(?,?,00000FFF,?), ref: 0080A11E
                            • __swprintf.LIBCMT ref: 0080A177
                            • __swprintf.LIBCMT ref: 0080A190
                            • _wprintf.LIBCMT ref: 0080A246
                            • _wprintf.LIBCMT ref: 0080A264
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: LoadString__swprintf_wprintf$_memmove
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                            • API String ID: 311963372-2391861430
                            • Opcode ID: bb9ca29800eb9ba2707a4babd82ffaa80bae6003d7618983447e35735e3e9ad2
                            • Instruction ID: 92f0f596fc245c063869508557668897f711e76486d44c2245fae567c8caa7c7
                            • Opcode Fuzzy Hash: bb9ca29800eb9ba2707a4babd82ffaa80bae6003d7618983447e35735e3e9ad2
                            • Instruction Fuzzy Hash: 80518C31904209EACF19EBA0CD8AEEEB779FF45300F104265F515B21A1EB392F59CB61
                            APIs
                              • Part of subcall function 007C0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,007A6C6C,?,00008000), ref: 007C0BB7
                              • Part of subcall function 007A48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007A48A1,?,?,007A37C0,?), ref: 007A48CE
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 007A6D0D
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 007A6E5A
                              • Part of subcall function 007A59CD: _wcscpy.LIBCMT ref: 007A5A05
                              • Part of subcall function 007C387D: _iswctype.LIBCMT ref: 007C3885
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                            • API String ID: 537147316-1018226102
                            • Opcode ID: b97bc3328d4e40d27c71e49a4a02d34f28754bf8b1365470f1aee450d024d928
                            • Instruction ID: 4108d932a68a565e8ec2fa278ef09168bc477e2aafdd230b594aa635e5749dee
                            • Opcode Fuzzy Hash: b97bc3328d4e40d27c71e49a4a02d34f28754bf8b1365470f1aee450d024d928
                            • Instruction Fuzzy Hash: 50028B71108341DFC725EF24C885AAFBBE5BFD6314F044A1EF486972A1DB38A949CB52
                            APIs
                            • _memset.LIBCMT ref: 007A45F9
                            • GetMenuItemCount.USER32(00866890), ref: 007DD7CD
                            • GetMenuItemCount.USER32(00866890), ref: 007DD87D
                            • GetCursorPos.USER32(?), ref: 007DD8C1
                            • SetForegroundWindow.USER32(00000000), ref: 007DD8CA
                            • TrackPopupMenuEx.USER32(00866890,00000000,?,00000000,00000000,00000000), ref: 007DD8DD
                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007DD8E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                            • String ID:
                            • API String ID: 2751501086-0
                            • Opcode ID: ab5d2bb6bbcc644aa78d737b9b210ae814b5d54fdd38e606e3b428b5c6378b72
                            • Instruction ID: ef2ed1f1431ff361426eca3710d515d1c33353cc621c34197ead0ee9c2977b85
                            • Opcode Fuzzy Hash: ab5d2bb6bbcc644aa78d737b9b210ae814b5d54fdd38e606e3b428b5c6378b72
                            • Instruction Fuzzy Hash: 9671F670600215BBEB318F24DC49FAABF75FF45364F204226F624A62E1C7BA6C50DB91
                            APIs
                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00820038,?,?), ref: 008210BC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharUpper
                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                            • API String ID: 3964851224-909552448
                            • Opcode ID: a6121f04173de5dd429652793f0ffb6faf9ead7fd92ee62332338d9adb6aab0e
                            • Instruction ID: 3af32978b56c9f5c8cdc6b89c0748cae5df0e1d75955f58b54f19f80a4c41f5e
                            • Opcode Fuzzy Hash: a6121f04173de5dd429652793f0ffb6faf9ead7fd92ee62332338d9adb6aab0e
                            • Instruction Fuzzy Hash: A4412E3025025ECBCF10EEA0E899AEA3725FF71341F604559FD9197292DB34AE5AC790
                            APIs
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                              • Part of subcall function 007A7A84: _memmove.LIBCMT ref: 007A7B0D
                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 008055D2
                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 008055E8
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008055F9
                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0080560B
                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0080561C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: SendString$_memmove
                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                            • API String ID: 2279737902-1007645807
                            • Opcode ID: b16d5ffcf816f6754904a9751e66fbf0531023b2d9909b9d1715ef8143a25719
                            • Instruction ID: ece7e40fe6aa1235ad948d73b4a7e562d37ee8a26db7e63051f94aede66269ce
                            • Opcode Fuzzy Hash: b16d5ffcf816f6754904a9751e66fbf0531023b2d9909b9d1715ef8143a25719
                            • Instruction Fuzzy Hash: 4111B620690159B9D728A6A1CC8ADFF7B7CFFD2B05F440669B821D21D1DE690D09C9B1
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                            • String ID: 0.0.0.0
                            • API String ID: 208665112-3771769585
                            • Opcode ID: 9e43363909e8cba5076bb4de310d66d87e9555d1bb340a3a0a1983e29837582d
                            • Instruction ID: 538215855afc398aeb021ca72411fb2dbfb5eb248b53db3d9dc815e950279aab
                            • Opcode Fuzzy Hash: 9e43363909e8cba5076bb4de310d66d87e9555d1bb340a3a0a1983e29837582d
                            • Instruction Fuzzy Hash: 8911D571904118EBCB24AB24AC4AFDB7BBCFB41710F04417DF604D61A2EF749A82DAA1
                            APIs
                            • timeGetTime.WINMM ref: 0080521C
                              • Part of subcall function 007C0719: timeGetTime.WINMM(?,75C0B400,007B0FF9), ref: 007C071D
                            • Sleep.KERNEL32(0000000A), ref: 00805248
                            • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0080526C
                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0080528E
                            • SetActiveWindow.USER32 ref: 008052AD
                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 008052BB
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 008052DA
                            • Sleep.KERNEL32(000000FA), ref: 008052E5
                            • IsWindow.USER32 ref: 008052F1
                            • EndDialog.USER32(00000000), ref: 00805302
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                            • String ID: BUTTON
                            • API String ID: 1194449130-3405671355
                            • Opcode ID: 3284d32fd63db6ffc87f9314683306e7f68162740e348fbb8bb26c20f6bdaa71
                            • Instruction ID: 98528a492bbfa0624015a0063072aba0fe7567efeb026751346c63dec39b3b9c
                            • Opcode Fuzzy Hash: 3284d32fd63db6ffc87f9314683306e7f68162740e348fbb8bb26c20f6bdaa71
                            • Instruction Fuzzy Hash: ED219F70204704AFE7515B60ED9DE263B69FB5534EF066478F602C22F2DBA19C11CAB2
                            APIs
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • CoInitialize.OLE32(00000000), ref: 0080D855
                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0080D8E8
                            • SHGetDesktopFolder.SHELL32(?), ref: 0080D8FC
                            • CoCreateInstance.OLE32(00832D7C,00000000,00000001,0085A89C,?), ref: 0080D948
                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0080D9B7
                            • CoTaskMemFree.OLE32(?,?), ref: 0080DA0F
                            • _memset.LIBCMT ref: 0080DA4C
                            • SHBrowseForFolderW.SHELL32(?), ref: 0080DA88
                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0080DAAB
                            • CoTaskMemFree.OLE32(00000000), ref: 0080DAB2
                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0080DAE9
                            • CoUninitialize.OLE32(00000001,00000000), ref: 0080DAEB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                            • String ID:
                            • API String ID: 1246142700-0
                            • Opcode ID: 5bd897aa8ac6355378f57405af380aaa464480766cab7f56072e028cf996cbb6
                            • Instruction ID: f62ad848680ccd59f7b8544544ddba45363576ad412797154e25e722a017c7f5
                            • Opcode Fuzzy Hash: 5bd897aa8ac6355378f57405af380aaa464480766cab7f56072e028cf996cbb6
                            • Instruction Fuzzy Hash: 8AB1F875A00219EFCB14DFA4C888DAEBBB9FF89304B048469F905EB261DB30ED41CB50
                            APIs
                            • GetKeyboardState.USER32(?), ref: 008005A7
                            • SetKeyboardState.USER32(?), ref: 00800612
                            • GetAsyncKeyState.USER32(000000A0), ref: 00800632
                            • GetKeyState.USER32(000000A0), ref: 00800649
                            • GetAsyncKeyState.USER32(000000A1), ref: 00800678
                            • GetKeyState.USER32(000000A1), ref: 00800689
                            • GetAsyncKeyState.USER32(00000011), ref: 008006B5
                            • GetKeyState.USER32(00000011), ref: 008006C3
                            • GetAsyncKeyState.USER32(00000012), ref: 008006EC
                            • GetKeyState.USER32(00000012), ref: 008006FA
                            • GetAsyncKeyState.USER32(0000005B), ref: 00800723
                            • GetKeyState.USER32(0000005B), ref: 00800731
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: 380f407fdd7cdec91ca7bae7668927fcb8f5a37dc4b747b90667d217695b746b
                            • Instruction ID: 0e70706766fa1f304750d52a564534cfa45b53479ece8426e3aab9596340b5f6
                            • Opcode Fuzzy Hash: 380f407fdd7cdec91ca7bae7668927fcb8f5a37dc4b747b90667d217695b746b
                            • Instruction Fuzzy Hash: 1151D730A0478829FF75DBA48C557AABFB5FF11380F088599D5C2DA1C2DA649B4CCF52
                            APIs
                            • GetDlgItem.USER32(?,00000001), ref: 007FC746
                            • GetWindowRect.USER32(00000000,?), ref: 007FC758
                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 007FC7B6
                            • GetDlgItem.USER32(?,00000002), ref: 007FC7C1
                            • GetWindowRect.USER32(00000000,?), ref: 007FC7D3
                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 007FC827
                            • GetDlgItem.USER32(?,000003E9), ref: 007FC835
                            • GetWindowRect.USER32(00000000,?), ref: 007FC846
                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 007FC889
                            • GetDlgItem.USER32(?,000003EA), ref: 007FC897
                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007FC8B4
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 007FC8C1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$ItemMoveRect$Invalidate
                            • String ID:
                            • API String ID: 3096461208-0
                            • Opcode ID: 1f9da9c964ce11980ef66bbedb7361e07e67cc03c7c2faf8a4a07d10bff37d4e
                            • Instruction ID: 2b7c16b9651b60a6302aa3435a7bfa6c1ddc89567581e5f9d22d635367156309
                            • Opcode Fuzzy Hash: 1f9da9c964ce11980ef66bbedb7361e07e67cc03c7c2faf8a4a07d10bff37d4e
                            • Instruction Fuzzy Hash: 78512E71B00209AFDB18CFA9DD89AAEBBB6FB98710F14813DF615D6291D7709D01CB50
                            APIs
                              • Part of subcall function 007A1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A2036,?,00000000,?,?,?,?,007A16CB,00000000,?), ref: 007A1B9A
                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 007A20D3
                            • KillTimer.USER32(-00000001,?,?,?,?,007A16CB,00000000,?,?,007A1AE2,?,?), ref: 007A216E
                            • DestroyAcceleratorTable.USER32(00000000), ref: 007DBEF6
                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007A16CB,00000000,?,?,007A1AE2,?,?), ref: 007DBF27
                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007A16CB,00000000,?,?,007A1AE2,?,?), ref: 007DBF3E
                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007A16CB,00000000,?,?,007A1AE2,?,?), ref: 007DBF5A
                            • DeleteObject.GDI32(00000000), ref: 007DBF6C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                            • String ID:
                            • API String ID: 641708696-0
                            • Opcode ID: c5fce75017cac9c94a852ff20d61ee64d51beca91249d248b885aec7446afcb9
                            • Instruction ID: 845246e067844c3f275ee64f52295920afbeb03a5d06f1314ba38f5b381b0bfe
                            • Opcode Fuzzy Hash: c5fce75017cac9c94a852ff20d61ee64d51beca91249d248b885aec7446afcb9
                            • Instruction Fuzzy Hash: 99619C31100651DFCB359F28DD48B2AB7F2FF81316F118639E54287A62C779A8A2DF90
                            APIs
                              • Part of subcall function 007A25DB: GetWindowLongW.USER32(?,000000EB), ref: 007A25EC
                            • GetSysColor.USER32(0000000F), ref: 007A21D3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ColorLongWindow
                            • String ID:
                            • API String ID: 259745315-0
                            • Opcode ID: c35066c91d96b4b0381ed2be458006837f2f406adcf5a8d9a1675b46ef3fae2a
                            • Instruction ID: 02465d50cc1af5ef3db63b591fd943bd238cea9e0a43ddb805c735559ac0f02d
                            • Opcode Fuzzy Hash: c35066c91d96b4b0381ed2be458006837f2f406adcf5a8d9a1675b46ef3fae2a
                            • Instruction Fuzzy Hash: B2418E311001549ADB265F2CDC48BB93B76FB86321F198366FE658A2E3C7398C43DB61
                            APIs
                            • CharLowerBuffW.USER32(?,?,0082F910), ref: 0080AB76
                            • GetDriveTypeW.KERNEL32(00000061,0085A620,00000061), ref: 0080AC40
                            • _wcscpy.LIBCMT ref: 0080AC6A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharDriveLowerType_wcscpy
                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                            • API String ID: 2820617543-1000479233
                            • Opcode ID: 927696f34ee44549196531ac1dd94bb9f9f7b4759cd36308de93a49edc2a8f6b
                            • Instruction ID: cfc816abb107652a6215629732d043c94cdbb740c0acde7db55d84fad9d289dd
                            • Opcode Fuzzy Hash: 927696f34ee44549196531ac1dd94bb9f9f7b4759cd36308de93a49edc2a8f6b
                            • Instruction Fuzzy Hash: 2751AA30208305DBC718EF14CC95AAAB7A5FF81314F004A2DF996972E2EB35D949CA93
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __i64tow__itow__swprintf
                            • String ID: %.15g$0x%p$False$True
                            • API String ID: 421087845-2263619337
                            • Opcode ID: 21d4032ad3f4640634266a5b14ee81e56c8d1b22a7d489d6aa7bd4853479449e
                            • Instruction ID: b7d347415f9801752245393d70a5a5c57f5cf947305aa8a8ab554dae73825663
                            • Opcode Fuzzy Hash: 21d4032ad3f4640634266a5b14ee81e56c8d1b22a7d489d6aa7bd4853479449e
                            • Instruction Fuzzy Hash: 0E41C371A04205FFDB249B38DC46F7B73F8EB85300F20456FE64AD6291EA79A942CB51
                            APIs
                            • _memset.LIBCMT ref: 008273D9
                            • CreateMenu.USER32 ref: 008273F4
                            • SetMenu.USER32(?,00000000), ref: 00827403
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00827490
                            • IsMenu.USER32(?), ref: 008274A6
                            • CreatePopupMenu.USER32 ref: 008274B0
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008274DD
                            • DrawMenuBar.USER32 ref: 008274E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                            • String ID: 0$F
                            • API String ID: 176399719-3044882817
                            • Opcode ID: b4c533007d0d35f580dddbfc94c5b2d4ba8ea0ef74f5ab756e1521a7f7c273c5
                            • Instruction ID: e0463dfe2d8ea8434c41d413a1ae36130b0e07feb8aa86144fd448645b99906c
                            • Opcode Fuzzy Hash: b4c533007d0d35f580dddbfc94c5b2d4ba8ea0ef74f5ab756e1521a7f7c273c5
                            • Instruction Fuzzy Hash: BF416874A00219EFDB20EF65E984E9ABBB9FF49300F144028FA05E73A1D730A960CB54
                            APIs
                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 008277CD
                            • CreateCompatibleDC.GDI32(00000000), ref: 008277D4
                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 008277E7
                            • SelectObject.GDI32(00000000,00000000), ref: 008277EF
                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 008277FA
                            • DeleteDC.GDI32(00000000), ref: 00827803
                            • GetWindowLongW.USER32(?,000000EC), ref: 0082780D
                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00827821
                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0082782D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                            • String ID: static
                            • API String ID: 2559357485-2160076837
                            • Opcode ID: fce2a14f971b5763776e6218a1a24e7e81e2ba0151ab1d764e527562521cdbcd
                            • Instruction ID: 99dd8924998939a782abbe5e31132ca64f35a9f15af3b505faa6f6f511f509da
                            • Opcode Fuzzy Hash: fce2a14f971b5763776e6218a1a24e7e81e2ba0151ab1d764e527562521cdbcd
                            • Instruction Fuzzy Hash: 27318C31105125ABDF229F65EC08FDA3BB9FF09721F114235FA15E60A1C731D862DBA4
                            APIs
                            • _memset.LIBCMT ref: 007C707B
                              • Part of subcall function 007C8D68: __getptd_noexit.LIBCMT ref: 007C8D68
                            • __gmtime64_s.LIBCMT ref: 007C7114
                            • __gmtime64_s.LIBCMT ref: 007C714A
                            • __gmtime64_s.LIBCMT ref: 007C7167
                            • __allrem.LIBCMT ref: 007C71BD
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C71D9
                            • __allrem.LIBCMT ref: 007C71F0
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C720E
                            • __allrem.LIBCMT ref: 007C7225
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C7243
                            • __invoke_watson.LIBCMT ref: 007C72B4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                            • String ID:
                            • API String ID: 384356119-0
                            • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                            • Instruction ID: 9dd0d435f739fcd3189137181cd3df629fbab80a3eba8aaff7ba087bb04de1b9
                            • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                            • Instruction Fuzzy Hash: C171B571A04716EBD7189E79CC46F5AB3B9BF54320F14822EF914E6381EB78DA40CB91
                            APIs
                            • _memset.LIBCMT ref: 00802A31
                            • GetMenuItemInfoW.USER32(00866890,000000FF,00000000,00000030), ref: 00802A92
                            • SetMenuItemInfoW.USER32(00866890,00000004,00000000,00000030), ref: 00802AC8
                            • Sleep.KERNEL32(000001F4), ref: 00802ADA
                            • GetMenuItemCount.USER32(?), ref: 00802B1E
                            • GetMenuItemID.USER32(?,00000000), ref: 00802B3A
                            • GetMenuItemID.USER32(?,-00000001), ref: 00802B64
                            • GetMenuItemID.USER32(?,?), ref: 00802BA9
                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00802BEF
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00802C03
                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00802C24
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                            • String ID:
                            • API String ID: 4176008265-0
                            • Opcode ID: aeead10a04d37a813edcf82a00f22072511ab4442c990c5f2fe3a0234b376f06
                            • Instruction ID: 8194ad00c5b8a10a4c71587f54854ff46b655e98687e3b32f648093f4063a4b8
                            • Opcode Fuzzy Hash: aeead10a04d37a813edcf82a00f22072511ab4442c990c5f2fe3a0234b376f06
                            • Instruction Fuzzy Hash: DE61D0B0900249EFEB61CF64CD9CEAEBBB8FB01314F104469E841E7291DBB1AD15DB21
                            APIs
                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00827214
                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00827217
                            • GetWindowLongW.USER32(?,000000F0), ref: 0082723B
                            • _memset.LIBCMT ref: 0082724C
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0082725E
                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 008272D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow_memset
                            • String ID:
                            • API String ID: 830647256-0
                            • Opcode ID: de695be6210a09b3e666acc48cf210f20fff103d4665d15d9b9bc692758a69c7
                            • Instruction ID: 4513b9745626e2ab10f265af47dd8db2279af5495c9d0d42b160c20ba4c8809e
                            • Opcode Fuzzy Hash: de695be6210a09b3e666acc48cf210f20fff103d4665d15d9b9bc692758a69c7
                            • Instruction Fuzzy Hash: 7D617871900258AFDB10DFA8DC85EEE77B8FB09704F10016AFA14E73A1D774A991DBA0
                            APIs
                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007F7135
                            • SafeArrayAllocData.OLEAUT32(?), ref: 007F718E
                            • VariantInit.OLEAUT32(?), ref: 007F71A0
                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 007F71C0
                            • VariantCopy.OLEAUT32(?,?), ref: 007F7213
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 007F7227
                            • VariantClear.OLEAUT32(?), ref: 007F723C
                            • SafeArrayDestroyData.OLEAUT32(?), ref: 007F7249
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007F7252
                            • VariantClear.OLEAUT32(?), ref: 007F7264
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007F726F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                            • String ID:
                            • API String ID: 2706829360-0
                            • Opcode ID: 855dbdc84f8142f9ea3fa687746036f89bfae865da18cc8ccab331dfbb881b4f
                            • Instruction ID: c0664dd052715ccdb1a4d72263377a71f3095f96564349562a3c54bf97805e3d
                            • Opcode Fuzzy Hash: 855dbdc84f8142f9ea3fa687746036f89bfae865da18cc8ccab331dfbb881b4f
                            • Instruction Fuzzy Hash: 5341303590411DEFCB14EF64D8489AEBBB9FF48354F008075FA15A7361DB74A946CB90
                            APIs
                            • WSAStartup.WSOCK32(00000101,?), ref: 00815AA6
                            • inet_addr.WSOCK32(?,?,?), ref: 00815AEB
                            • gethostbyname.WSOCK32(?), ref: 00815AF7
                            • IcmpCreateFile.IPHLPAPI ref: 00815B05
                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00815B75
                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00815B8B
                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00815C00
                            • WSACleanup.WSOCK32 ref: 00815C06
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                            • String ID: Ping
                            • API String ID: 1028309954-2246546115
                            • Opcode ID: e4462b03adc3150c2573ed3ed46999251a87e6c3308c31b3c7053477667414ef
                            • Instruction ID: 56c1f9f51a946ab45b7960fade3fcf157da8341228c2a8cb1aaea192231cb2fe
                            • Opcode Fuzzy Hash: e4462b03adc3150c2573ed3ed46999251a87e6c3308c31b3c7053477667414ef
                            • Instruction Fuzzy Hash: 48518031608700DFDB219F24CC89B6ABBE8FF85720F14892AF655DB2A1DB74E840CB51
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0080B73B
                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0080B7B1
                            • GetLastError.KERNEL32 ref: 0080B7BB
                            • SetErrorMode.KERNEL32(00000000,READY), ref: 0080B828
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Error$Mode$DiskFreeLastSpace
                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                            • API String ID: 4194297153-14809454
                            • Opcode ID: b55f0306455f7698ad4b7fd7d3858dc40918285c785cbd28a706fbcdfe162582
                            • Instruction ID: 6411bb4630050fb99294df1be461e569e86e4ec5001b8ba1383f16e3b684b8e0
                            • Opcode Fuzzy Hash: b55f0306455f7698ad4b7fd7d3858dc40918285c785cbd28a706fbcdfe162582
                            • Instruction Fuzzy Hash: BC31C035A00209DFCB54EF64CC89AAE7BB8FF85700F108129EA12D72D1DB359D02C751
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 007FB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 007FB0E7
                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007F94F6
                            • GetDlgCtrlID.USER32 ref: 007F9501
                            • GetParent.USER32 ref: 007F951D
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F9520
                            • GetDlgCtrlID.USER32(?), ref: 007F9529
                            • GetParent.USER32(?), ref: 007F9545
                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 007F9548
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 1536045017-1403004172
                            • Opcode ID: 4c7f720c91ebf0af82548c0f8d3509d6c02e9f2286c47e966110382096e7cc31
                            • Instruction ID: 7cd1bf1c5c4494efee10caa851da0dc6721ba644f88805b4de8f2f5df94ea26f
                            • Opcode Fuzzy Hash: 4c7f720c91ebf0af82548c0f8d3509d6c02e9f2286c47e966110382096e7cc31
                            • Instruction Fuzzy Hash: 8D219274A00108BBCF05AB64CC89EFEBB74FF95310F104265BA61972E2EB795919DA20
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 007FB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 007FB0E7
                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007F95DF
                            • GetDlgCtrlID.USER32 ref: 007F95EA
                            • GetParent.USER32 ref: 007F9606
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F9609
                            • GetDlgCtrlID.USER32(?), ref: 007F9612
                            • GetParent.USER32(?), ref: 007F962E
                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 007F9631
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 1536045017-1403004172
                            • Opcode ID: fced703e8b0de9646012265d5c6e2a7e4ee0079650adeb75314e6adb88c335af
                            • Instruction ID: fc06c181f5ec641381b472fb2e7cea8b2b678b93104e6a006940eb824af9d31e
                            • Opcode Fuzzy Hash: fced703e8b0de9646012265d5c6e2a7e4ee0079650adeb75314e6adb88c335af
                            • Instruction Fuzzy Hash: C3218674A00108BBDF15AB60CC85EFEBB74FF59300F104165FB61972A2EB795519DA20
                            APIs
                            • GetParent.USER32 ref: 007F9651
                            • GetClassNameW.USER32(00000000,?,00000100), ref: 007F9666
                            • _wcscmp.LIBCMT ref: 007F9678
                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007F96F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClassMessageNameParentSend_wcscmp
                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                            • API String ID: 1704125052-3381328864
                            • Opcode ID: 21345480fabeb5b2ae4447ce9e966d274bc56a4c95611f2f542a76a15504c23a
                            • Instruction ID: 630cc82c7aef31213e20708e216a6c257535b89da10ab309e59c176d340688e4
                            • Opcode Fuzzy Hash: 21345480fabeb5b2ae4447ce9e966d274bc56a4c95611f2f542a76a15504c23a
                            • Instruction Fuzzy Hash: C0110A7A24830BFAF6112620DC0AFB6779CEB04761B20412AFF10E52D1FE5E69158958
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00818BEC
                            • CoInitialize.OLE32(00000000), ref: 00818C19
                            • CoUninitialize.OLE32 ref: 00818C23
                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00818D23
                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00818E50
                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00832C0C), ref: 00818E84
                            • CoGetObject.OLE32(?,00000000,00832C0C,?), ref: 00818EA7
                            • SetErrorMode.KERNEL32(00000000), ref: 00818EBA
                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00818F3A
                            • VariantClear.OLEAUT32(?), ref: 00818F4A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                            • String ID:
                            • API String ID: 2395222682-0
                            • Opcode ID: 02d1f63fec6e18b5e563e326e38bf1a0f93b4cfb511c163b3c4c2248b0db6e32
                            • Instruction ID: 2c7fcc2775a74001979af3e8d6200aaa7ebef50db35b8a79a930c176e22d318d
                            • Opcode Fuzzy Hash: 02d1f63fec6e18b5e563e326e38bf1a0f93b4cfb511c163b3c4c2248b0db6e32
                            • Instruction Fuzzy Hash: 78C1F0B1208305EF8700DF68C88596ABBE9FF89748F00496DF58ADB251DB71ED46CB52
                            APIs
                            • __swprintf.LIBCMT ref: 0080419D
                            • __swprintf.LIBCMT ref: 008041AA
                              • Part of subcall function 007C38D8: __woutput_l.LIBCMT ref: 007C3931
                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 008041D4
                            • LoadResource.KERNEL32(?,00000000), ref: 008041E0
                            • LockResource.KERNEL32(00000000), ref: 008041ED
                            • FindResourceW.KERNEL32(?,?,00000003), ref: 0080420D
                            • LoadResource.KERNEL32(?,00000000), ref: 0080421F
                            • SizeofResource.KERNEL32(?,00000000), ref: 0080422E
                            • LockResource.KERNEL32(?), ref: 0080423A
                            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0080429B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                            • String ID:
                            • API String ID: 1433390588-0
                            • Opcode ID: 1c47ac6395447925879284ce5cdb07965e21af795b8d35dcf9e86e93599b14cc
                            • Instruction ID: 4176d73ce95a80bb0e2fe75b2e855cb6a7dc55c7d45354550a9f958ea6bb1e9a
                            • Opcode Fuzzy Hash: 1c47ac6395447925879284ce5cdb07965e21af795b8d35dcf9e86e93599b14cc
                            • Instruction Fuzzy Hash: 4D31AEB164520AABDB119F60DD48EBB7BBCFF05301F008529FA02D2191D774DA62CBA0
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00801700
                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00800778,?,00000001), ref: 00801714
                            • GetWindowThreadProcessId.USER32(00000000), ref: 0080171B
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00800778,?,00000001), ref: 0080172A
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0080173C
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00800778,?,00000001), ref: 00801755
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00800778,?,00000001), ref: 00801767
                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00800778,?,00000001), ref: 008017AC
                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00800778,?,00000001), ref: 008017C1
                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00800778,?,00000001), ref: 008017CC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                            • String ID:
                            • API String ID: 2156557900-0
                            • Opcode ID: e92ba25d4bf059dee1c45b3141a8ff8f706abaabe13931fa083d61dd1dca2019
                            • Instruction ID: 55955ba0140b84dcac061f5ee7cc53f9c13280e3080f8fc1e10e160e965ba8d2
                            • Opcode Fuzzy Hash: e92ba25d4bf059dee1c45b3141a8ff8f706abaabe13931fa083d61dd1dca2019
                            • Instruction Fuzzy Hash: 0C31BB75600204BBEF219F24ED88F693BB9FB25725F118028FA01C62E4DBB49D40CBA0
                            APIs
                            • EnumChildWindows.USER32(?,007FAA64), ref: 007FA9A2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ChildEnumWindows
                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                            • API String ID: 3555792229-1603158881
                            • Opcode ID: 80579134774073acfe7448ffb34330b150137fc082cb6c92c74e23301e673b1a
                            • Instruction ID: 6b8ca6d334ecf05150d8fe167f4cb0b1c534850bda60a0a2a8fdc72452f21488
                            • Opcode Fuzzy Hash: 80579134774073acfe7448ffb34330b150137fc082cb6c92c74e23301e673b1a
                            • Instruction Fuzzy Hash: E89184B060010AEADB08DF60C485BF9FBB4FF14354F508129DA9EA7251DB787A5DCBA1
                            APIs
                            • SetWindowLongW.USER32(?,000000EB), ref: 007A2EAE
                              • Part of subcall function 007A1DB3: GetClientRect.USER32(?,?), ref: 007A1DDC
                              • Part of subcall function 007A1DB3: GetWindowRect.USER32(?,?), ref: 007A1E1D
                              • Part of subcall function 007A1DB3: ScreenToClient.USER32(?,?), ref: 007A1E45
                            • GetDC.USER32 ref: 007DCF82
                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007DCF95
                            • SelectObject.GDI32(00000000,00000000), ref: 007DCFA3
                            • SelectObject.GDI32(00000000,00000000), ref: 007DCFB8
                            • ReleaseDC.USER32(?,00000000), ref: 007DCFC0
                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007DD04B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                            • String ID: U
                            • API String ID: 4009187628-3372436214
                            • Opcode ID: 6bff3a9d81ad024b9da2d3ba3720ddb439a97645d61419d8622fdfb65e403643
                            • Instruction ID: 01c14d853f5b0546bf593bb1b5105c842e241f4cf5c2102d660406a18c6e36c0
                            • Opcode Fuzzy Hash: 6bff3a9d81ad024b9da2d3ba3720ddb439a97645d61419d8622fdfb65e403643
                            • Instruction Fuzzy Hash: 7071E531504205DFCF319F68C884AFA7BB6FF89310F14426AED559A266D7398C92DF60
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                              • Part of subcall function 007A2344: GetCursorPos.USER32(?), ref: 007A2357
                              • Part of subcall function 007A2344: ScreenToClient.USER32(008667B0,?), ref: 007A2374
                              • Part of subcall function 007A2344: GetAsyncKeyState.USER32(00000001), ref: 007A2399
                              • Part of subcall function 007A2344: GetAsyncKeyState.USER32(00000002), ref: 007A23A7
                            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0082C2E4
                            • ImageList_EndDrag.COMCTL32 ref: 0082C2EA
                            • ReleaseCapture.USER32 ref: 0082C2F0
                            • SetWindowTextW.USER32(?,00000000), ref: 0082C39A
                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0082C3AD
                            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0082C48F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                            • String ID: @GUI_DRAGFILE$@GUI_DROPID
                            • API String ID: 1924731296-2107944366
                            • Opcode ID: 83ebc89c303599e9fb8f284f31c2fdc5bbcc43a7c02b3ab3db9e2d905a26b220
                            • Instruction ID: 00c2673ae2b95c05949cff43d88252bbaef6a994dfddc6afacfc3ea61ea0eaa0
                            • Opcode Fuzzy Hash: 83ebc89c303599e9fb8f284f31c2fdc5bbcc43a7c02b3ab3db9e2d905a26b220
                            • Instruction Fuzzy Hash: B6518D70204244EFD714EF24D859F6A7BE5FB88310F00862DF6518B2A2DB759999CB52
                            APIs
                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0082F910), ref: 0081903D
                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0082F910), ref: 00819071
                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008191EB
                            • SysFreeString.OLEAUT32(?), ref: 00819215
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                            • String ID:
                            • API String ID: 560350794-0
                            • Opcode ID: aca5d32c7a7fa0790a05fc2744d78fa246615a20661673b96afc668f6d3d1746
                            • Instruction ID: f17c732a42729459481e5e4a06a0a20070021f926851b0fa668a2184d846e7a5
                            • Opcode Fuzzy Hash: aca5d32c7a7fa0790a05fc2744d78fa246615a20661673b96afc668f6d3d1746
                            • Instruction Fuzzy Hash: 3EF11571A00109EFCB04DF94C898EEEB7B9FF89314F108059F556AB251DB35AE86CB50
                            APIs
                            • _memset.LIBCMT ref: 0081F9C9
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081FB5C
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081FB80
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081FBC0
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081FBE2
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081FD5E
                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0081FD90
                            • CloseHandle.KERNEL32(?), ref: 0081FDBF
                            • CloseHandle.KERNEL32(?), ref: 0081FE36
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                            • String ID:
                            • API String ID: 4090791747-0
                            • Opcode ID: c3cddb0effcd34c155cee028fd98cce194088963b31679b27b1f8536bcf86c67
                            • Instruction ID: d0aefd8e11e04cc7c6885d11e8893cd9c34d700044bf581304ec4993e5eeb869
                            • Opcode Fuzzy Hash: c3cddb0effcd34c155cee028fd98cce194088963b31679b27b1f8536bcf86c67
                            • Instruction Fuzzy Hash: BBE19E31204201DFC714EF24C895BAABBE4FF85314F14856DFA999B2A2DB35EC81CB52
                            APIs
                              • Part of subcall function 008048AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008038D3,?), ref: 008048C7
                              • Part of subcall function 008048AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008038D3,?), ref: 008048E0
                              • Part of subcall function 00804CD3: GetFileAttributesW.KERNEL32(?,00803947), ref: 00804CD4
                            • lstrcmpiW.KERNEL32(?,?), ref: 00804FE2
                            • _wcscmp.LIBCMT ref: 00804FFC
                            • MoveFileW.KERNEL32(?,?), ref: 00805017
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                            • String ID:
                            • API String ID: 793581249-0
                            • Opcode ID: db59df6b0eb802e1729039745a91e90f381784de0453ae64ce03a4bc54d37dc3
                            • Instruction ID: 1caf81958214275b84d11669d945b979e663b9d043e207898a1a89ad3bad77c6
                            • Opcode Fuzzy Hash: db59df6b0eb802e1729039745a91e90f381784de0453ae64ce03a4bc54d37dc3
                            • Instruction Fuzzy Hash: E15174B20087859BD764DB54CC85DDFB7ECEF85300F00492EB685D3192EE74A289CB66
                            APIs
                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0082896E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: InvalidateRect
                            • String ID:
                            • API String ID: 634782764-0
                            • Opcode ID: be9e54a29356c5fec0091e252c1ec0edc0932b15098e991e5e1b14d01b9f2b4d
                            • Instruction ID: 48535c64f8fa19cfde6d43775e63b0e33596094aa059f3ad661ee40e6c0251bf
                            • Opcode Fuzzy Hash: be9e54a29356c5fec0091e252c1ec0edc0932b15098e991e5e1b14d01b9f2b4d
                            • Instruction Fuzzy Hash: E3519130502278FEDF309F28AC89BA97B65FB05354F604122F512E65A2DF71A9D0DB82
                            APIs
                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 007DC547
                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007DC569
                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007DC581
                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 007DC59F
                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007DC5C0
                            • DestroyIcon.USER32(00000000), ref: 007DC5CF
                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007DC5EC
                            • DestroyIcon.USER32(?), ref: 007DC5FB
                              • Part of subcall function 0082A71E: DeleteObject.GDI32(00000000), ref: 0082A757
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                            • String ID:
                            • API String ID: 2819616528-0
                            • Opcode ID: b05a345e77695e2f27964794fd244d91a1c366b78dfcae98d7e6e0c919078d22
                            • Instruction ID: 38b693f1b35b2bf9c815c10d3b04f48b31aede1e747d1b81db113101f82790e3
                            • Opcode Fuzzy Hash: b05a345e77695e2f27964794fd244d91a1c366b78dfcae98d7e6e0c919078d22
                            • Instruction Fuzzy Hash: C5513A70600206EFDB24DF28DC45FAA77B5FB95310F104629F942972A1EBB8ED91DB60
                            APIs
                              • Part of subcall function 007FAE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 007FAE77
                              • Part of subcall function 007FAE57: GetCurrentThreadId.KERNEL32 ref: 007FAE7E
                              • Part of subcall function 007FAE57: AttachThreadInput.USER32(00000000,?,007F9B65,?,00000001), ref: 007FAE85
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F9B70
                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007F9B8D
                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 007F9B90
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F9B99
                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007F9BB7
                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007F9BBA
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F9BC3
                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007F9BDA
                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007F9BDD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                            • String ID:
                            • API String ID: 2014098862-0
                            • Opcode ID: ac57b26cfc95ff4aa49cdf8407ca1015a3b7bafdbedab40c18773fa4e364c436
                            • Instruction ID: 0986ab5c7796a4c273a65240f31bce2d2e2386eebd33b07cffacfca753b14d33
                            • Opcode Fuzzy Hash: ac57b26cfc95ff4aa49cdf8407ca1015a3b7bafdbedab40c18773fa4e364c436
                            • Instruction Fuzzy Hash: 0811E1B1550218FEF6206B60DC8EF6A3B2DEB4CB51F504425F348AB1A1CAF25C21DAA4
                            APIs
                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,007F8A84,00000B00,?,?), ref: 007F8E0C
                            • HeapAlloc.KERNEL32(00000000,?,007F8A84,00000B00,?,?), ref: 007F8E13
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F8A84,00000B00,?,?), ref: 007F8E28
                            • GetCurrentProcess.KERNEL32(?,00000000,?,007F8A84,00000B00,?,?), ref: 007F8E30
                            • DuplicateHandle.KERNEL32(00000000,?,007F8A84,00000B00,?,?), ref: 007F8E33
                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,007F8A84,00000B00,?,?), ref: 007F8E43
                            • GetCurrentProcess.KERNEL32(007F8A84,00000000,?,007F8A84,00000B00,?,?), ref: 007F8E4B
                            • DuplicateHandle.KERNEL32(00000000,?,007F8A84,00000B00,?,?), ref: 007F8E4E
                            • CreateThread.KERNEL32(00000000,00000000,007F8E74,00000000,00000000,00000000), ref: 007F8E68
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                            • String ID:
                            • API String ID: 1957940570-0
                            • Opcode ID: dfb04c9742929dd7e76bf43b18419a6329cab92e88038dfe2dd42f18ce446df8
                            • Instruction ID: 5ec84af09126b35e4a5b4e4d77035379af61074f2d5613e905416f7aab36bfca
                            • Opcode Fuzzy Hash: dfb04c9742929dd7e76bf43b18419a6329cab92e88038dfe2dd42f18ce446df8
                            • Instruction Fuzzy Hash: A901ACB5640308FFE621AB65DD4AF6B3B6CFB89711F408421FB05DB191CA749811CA20
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$_memset
                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                            • API String ID: 2862541840-625585964
                            • Opcode ID: 35216901a8476f11cd9e007d62b439b51d1caa680e579b84d19dcee2298caa02
                            • Instruction ID: fd4e40c0b877e89355d2feffcd7e7bc4d9f9997260685dbe1a2bf691b60b64b2
                            • Opcode Fuzzy Hash: 35216901a8476f11cd9e007d62b439b51d1caa680e579b84d19dcee2298caa02
                            • Instruction Fuzzy Hash: 6791BC70A00209ABDF24DFA4C858FEEB7B8FF95714F108159F559EB280D7709985CBA0
                            APIs
                              • Part of subcall function 007F7652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?,?,?,007F799D), ref: 007F766F
                              • Part of subcall function 007F7652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?,?), ref: 007F768A
                              • Part of subcall function 007F7652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?,?), ref: 007F7698
                              • Part of subcall function 007F7652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?), ref: 007F76A8
                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00819B1B
                            • _memset.LIBCMT ref: 00819B28
                            • _memset.LIBCMT ref: 00819C6B
                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00819C97
                            • CoTaskMemFree.OLE32(?), ref: 00819CA2
                            Strings
                            • NULL Pointer assignment, xrefs: 00819CF0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                            • String ID: NULL Pointer assignment
                            • API String ID: 1300414916-2785691316
                            • Opcode ID: 4415cc393a2c7b1844208bd7f0db402d49d015be6d1f52da1775542c7f81d7b5
                            • Instruction ID: fdc1caf9fdbd7d31cd155f1c1933bb3b1da2d6a98bea9a07bdd5accc96998795
                            • Opcode Fuzzy Hash: 4415cc393a2c7b1844208bd7f0db402d49d015be6d1f52da1775542c7f81d7b5
                            • Instruction Fuzzy Hash: 5D913971D00229EBDB10DFA4DC94EDEBBB8FF49710F10816AE519A7241EB355A45CFA0
                            APIs
                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00827093
                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 008270A7
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 008270C1
                            • _wcscat.LIBCMT ref: 0082711C
                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00827133
                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00827161
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$Window_wcscat
                            • String ID: SysListView32
                            • API String ID: 307300125-78025650
                            • Opcode ID: 26fd7036448bb8d7175fc09525b7bfb82ef1ee9a2f79cfc938443012802558b7
                            • Instruction ID: 438699e6d29f5b76b2c5bd29fcea58a997ef7769a341b725f85dadf7af01f5c2
                            • Opcode Fuzzy Hash: 26fd7036448bb8d7175fc09525b7bfb82ef1ee9a2f79cfc938443012802558b7
                            • Instruction Fuzzy Hash: 6341A270904318EBEB219FA4DC89BEE77B8FF08350F10452AF944E7292D6759D89CB50
                            APIs
                              • Part of subcall function 00803E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00803EB6
                              • Part of subcall function 00803E91: Process32FirstW.KERNEL32(00000000,?), ref: 00803EC4
                              • Part of subcall function 00803E91: CloseHandle.KERNEL32(00000000), ref: 00803F8E
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081ECB8
                            • GetLastError.KERNEL32 ref: 0081ECCB
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081ECFA
                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0081ED77
                            • GetLastError.KERNEL32(00000000), ref: 0081ED82
                            • CloseHandle.KERNEL32(00000000), ref: 0081EDB7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                            • String ID: SeDebugPrivilege
                            • API String ID: 2533919879-2896544425
                            • Opcode ID: 2d5013f9b5193fbf35aff510c117109e6055ad9b2f37b4495d308d45fd7fdfb5
                            • Instruction ID: 0dcbbc37c19f8822ebf58a37080f3500b80b2423e6fb557995c46e02dc83ed5a
                            • Opcode Fuzzy Hash: 2d5013f9b5193fbf35aff510c117109e6055ad9b2f37b4495d308d45fd7fdfb5
                            • Instruction Fuzzy Hash: D4419C702002009FDB21EF18CC99FADB7A4FF81714F088059FA429B2D2DB79A854CB96
                            APIs
                            • LoadIconW.USER32(00000000,00007F03), ref: 008032C5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: IconLoad
                            • String ID: blank$info$question$stop$warning
                            • API String ID: 2457776203-404129466
                            • Opcode ID: cde8d078985e080ee6474ef7b7de114e6da01c22c265910e5e2f074bc0cc2b0e
                            • Instruction ID: 068fa24bf4262a422cbce4db40b2eaa95b6eb03d17dbecc255c4dc0e25634c22
                            • Opcode Fuzzy Hash: cde8d078985e080ee6474ef7b7de114e6da01c22c265910e5e2f074bc0cc2b0e
                            • Instruction Fuzzy Hash: 57116A3520874ABFE7455B54DC83D6AB79CFF09376F20002EF900E62C1E7B95B4045A5
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0080454E
                            • LoadStringW.USER32(00000000), ref: 00804555
                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0080456B
                            • LoadStringW.USER32(00000000), ref: 00804572
                            • _wprintf.LIBCMT ref: 00804598
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 008045B6
                            Strings
                            • %s (%d) : ==> %s: %s %s, xrefs: 00804593
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message_wprintf
                            • String ID: %s (%d) : ==> %s: %s %s
                            • API String ID: 3648134473-3128320259
                            • Opcode ID: b0925c3fa080ecd281e63e2724652593fd8784e91cbe7f68bc6e526f06e87bb9
                            • Instruction ID: b597334e8df2d027a5a6b5ef9a7d54439cb6de884742d510efb5caa05c483510
                            • Opcode Fuzzy Hash: b0925c3fa080ecd281e63e2724652593fd8784e91cbe7f68bc6e526f06e87bb9
                            • Instruction Fuzzy Hash: 0C0167F2500208BFE7619794DD89EE7777CFB08301F4045B5BB45E2152E6745E858B70
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • GetSystemMetrics.USER32(0000000F), ref: 0082D78A
                            • GetSystemMetrics.USER32(0000000F), ref: 0082D7AA
                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0082D9E5
                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0082DA03
                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0082DA24
                            • ShowWindow.USER32(00000003,00000000), ref: 0082DA43
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0082DA68
                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 0082DA8B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                            • String ID:
                            • API String ID: 1211466189-0
                            • Opcode ID: 56be6f67c2584fb80e23307c6579902cba318012e27f9219c97d8b4e52a2a6db
                            • Instruction ID: c7396b2cf57098dbe8f757ca762a2efd2329565fa3b0afe2d91887f55dc757ea
                            • Opcode Fuzzy Hash: 56be6f67c2584fb80e23307c6579902cba318012e27f9219c97d8b4e52a2a6db
                            • Instruction Fuzzy Hash: 60B16671600229AFDF18CF68D985BAD7BB1FF48701F088169ED49DB296D734A990CB90
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,007DC417,00000004,00000000,00000000,00000000), ref: 007A2ACF
                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,007DC417,00000004,00000000,00000000,00000000,000000FF), ref: 007A2B17
                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,007DC417,00000004,00000000,00000000,00000000), ref: 007DC46A
                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,007DC417,00000004,00000000,00000000,00000000), ref: 007DC4D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: e5c50f2582590f7c3941a7aa670707cd4510d94071e25b1b8e3f6301886c9dc2
                            • Instruction ID: dc9ec9d8d2ea08425506bb50185ea135e1972b959a58fea6703b106a93f09857
                            • Opcode Fuzzy Hash: e5c50f2582590f7c3941a7aa670707cd4510d94071e25b1b8e3f6301886c9dc2
                            • Instruction Fuzzy Hash: BC41E9312046C1EAC7368B2C8D9CA7B7BA2BFD7300F14C62AE94786663D67D9843D710
                            APIs
                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0080737F
                              • Part of subcall function 007C0FF6: std::exception::exception.LIBCMT ref: 007C102C
                              • Part of subcall function 007C0FF6: __CxxThrowException@8.LIBCMT ref: 007C1041
                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 008073B6
                            • EnterCriticalSection.KERNEL32(?), ref: 008073D2
                            • _memmove.LIBCMT ref: 00807420
                            • _memmove.LIBCMT ref: 0080743D
                            • LeaveCriticalSection.KERNEL32(?), ref: 0080744C
                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00807461
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00807480
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                            • String ID:
                            • API String ID: 256516436-0
                            • Opcode ID: ee6d636a71364b55c5e6f323c55e2c697ed7811065f374a098e86984959ab8c1
                            • Instruction ID: 74ed2f71f8a370ef2976f74f5516844401be596fc613a6822ffe6f7e471a2a45
                            • Opcode Fuzzy Hash: ee6d636a71364b55c5e6f323c55e2c697ed7811065f374a098e86984959ab8c1
                            • Instruction Fuzzy Hash: 97318E31904205EBDB10DF54DD89EAE7BB8FF45710B5480B9F904EB246DB34DA51CBA0
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 0082645A
                            • GetDC.USER32(00000000), ref: 00826462
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0082646D
                            • ReleaseDC.USER32(00000000,00000000), ref: 00826479
                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 008264B5
                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 008264C6
                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00829299,?,?,000000FF,00000000,?,000000FF,?), ref: 00826500
                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00826520
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                            • String ID:
                            • API String ID: 3864802216-0
                            • Opcode ID: 25797b82ed190d85846fbfbedd6dc58a80f8bf94675c00836cd89b094c8f2a4e
                            • Instruction ID: 63683fac35b59bf169e15014b1428830d23c23ab551aa58537f5de15fc04fe39
                            • Opcode Fuzzy Hash: 25797b82ed190d85846fbfbedd6dc58a80f8bf94675c00836cd89b094c8f2a4e
                            • Instruction Fuzzy Hash: 0B316D72201214BFEB218F50DD4AFEA3FA9FF19761F044065FE08DA192D6759C52CB64
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: aeb8899fff047fb973e21c0fdcff2157c5890fcd20b30dc0f14fd10c831a1789
                            • Instruction ID: 3c1c746f1a1295c458a4bc828519aa2d12f839fda8c7257b2dbf004b078c1725
                            • Opcode Fuzzy Hash: aeb8899fff047fb973e21c0fdcff2157c5890fcd20b30dc0f14fd10c831a1789
                            • Instruction Fuzzy Hash: CA21A1B160020DF6D216A6258E56FBB235CAF513A4F444028FF05A6383EF5DDD22C1E5
                            APIs
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                              • Part of subcall function 007BFEC6: _wcscpy.LIBCMT ref: 007BFEE9
                            • _wcstok.LIBCMT ref: 0080EEFF
                            • _wcscpy.LIBCMT ref: 0080EF8E
                            • _memset.LIBCMT ref: 0080EFC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                            • String ID: X
                            • API String ID: 774024439-3081909835
                            • Opcode ID: fe3292158bf31fcbb79eb87abf195430b8fad57926690b4d4943e2bc0b1a87af
                            • Instruction ID: 5182d383e0db3c90734cee3d2885dc714428aec3ad94dca69d15fe9c6c73f901
                            • Opcode Fuzzy Hash: fe3292158bf31fcbb79eb87abf195430b8fad57926690b4d4943e2bc0b1a87af
                            • Instruction Fuzzy Hash: EFC16C71608701DFC764EF24C889A5AB7E4FF85310F008A6DF999972A2DB34ED45CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cd58e79385438ae9840ed215ec535a30a1439dd23b47049db036a906e248840e
                            • Instruction ID: 0592b939f5f2d3dc3ad15f3d7724c0968b09204e13566a6220614534acf56a44
                            • Opcode Fuzzy Hash: cd58e79385438ae9840ed215ec535a30a1439dd23b47049db036a906e248840e
                            • Instruction Fuzzy Hash: F1718C30904149EFDB14CF98CC49ABEBB79FF8A310F54C259F915AA251C738AA51CFA4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6438c1b6f40a4ba44f114bc9818594d1e8a398c4cbcc31769614c47af10126a3
                            • Instruction ID: 34c718061f4ac5ad1c4f9ab60d83434816260a2064d80676689fe264e4fa7627
                            • Opcode Fuzzy Hash: 6438c1b6f40a4ba44f114bc9818594d1e8a398c4cbcc31769614c47af10126a3
                            • Instruction Fuzzy Hash: 8C61AE71508700EBC710EB24CC8AEABB7A9EFC9714F108A1DF64597292DA749D45CB92
                            APIs
                            • IsWindow.USER32(00F25798), ref: 0082B6A5
                            • IsWindowEnabled.USER32(00F25798), ref: 0082B6B1
                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0082B795
                            • SendMessageW.USER32(00F25798,000000B0,?,?), ref: 0082B7CC
                            • IsDlgButtonChecked.USER32(?,?), ref: 0082B809
                            • GetWindowLongW.USER32(00F25798,000000EC), ref: 0082B82B
                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0082B843
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                            • String ID:
                            • API String ID: 4072528602-0
                            • Opcode ID: ddaa6b2c33a14eb515fc40fead5e0699a482bfffc9db9f2422bdcf1938a024e3
                            • Instruction ID: 3a968cf107e13f2a7c3cae88a9acc746cb0860126ce110e69a5ada2444c5f2ca
                            • Opcode Fuzzy Hash: ddaa6b2c33a14eb515fc40fead5e0699a482bfffc9db9f2422bdcf1938a024e3
                            • Instruction Fuzzy Hash: 0071BE34602264AFDB20DF64E894FBA7BB9FF99300F144069EA46D73A1D731AC91DB50
                            APIs
                            • _memset.LIBCMT ref: 0081F75C
                            • _memset.LIBCMT ref: 0081F825
                            • ShellExecuteExW.SHELL32(?), ref: 0081F86A
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                              • Part of subcall function 007BFEC6: _wcscpy.LIBCMT ref: 007BFEE9
                            • GetProcessId.KERNEL32(00000000), ref: 0081F8E1
                            • CloseHandle.KERNEL32(00000000), ref: 0081F910
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                            • String ID: @
                            • API String ID: 3522835683-2766056989
                            • Opcode ID: a7d923bd8877591831315ea00e19060fc24bfc4012ebdb62a536573698c83587
                            • Instruction ID: 52ec2dde99fa212cf66fe505a466fd0cec66cdeadb6fa4f68181e434f59c918e
                            • Opcode Fuzzy Hash: a7d923bd8877591831315ea00e19060fc24bfc4012ebdb62a536573698c83587
                            • Instruction Fuzzy Hash: 67618F75A00619DFCB14EF54C484AAEBBF9FF89310F14856DE945AB352CB34AD81CB90
                            APIs
                            • GetParent.USER32(?), ref: 0080149C
                            • GetKeyboardState.USER32(?), ref: 008014B1
                            • SetKeyboardState.USER32(?), ref: 00801512
                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00801540
                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 0080155F
                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 008015A5
                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 008015C8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 52e4f70be7409519737d44b2e597012ca016a64f1ecc32c2b8e0f68413674ab8
                            • Instruction ID: 908b852c7b9adf257b712afc417df93a2ce54460e297c50d5e1dd51d0628c927
                            • Opcode Fuzzy Hash: 52e4f70be7409519737d44b2e597012ca016a64f1ecc32c2b8e0f68413674ab8
                            • Instruction Fuzzy Hash: 775103A06047D53EFF7642388C49BBABEAABB46324F088589E1D5CA8D3C795DC84D750
                            APIs
                            • GetParent.USER32(00000000), ref: 008012B5
                            • GetKeyboardState.USER32(?), ref: 008012CA
                            • SetKeyboardState.USER32(?), ref: 0080132B
                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00801357
                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00801374
                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 008013B8
                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 008013D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 23e146fc95175664648fad1add781a1afab245bf02bc1530ba933af318e9c696
                            • Instruction ID: 047ed1119f9c57d088da6a0193b36e52796d836a34a86baf536b0054f5dd5776
                            • Opcode Fuzzy Hash: 23e146fc95175664648fad1add781a1afab245bf02bc1530ba933af318e9c696
                            • Instruction Fuzzy Hash: 5E5104A09047D53EFF7683248C49B7ABFA9FB06320F088589E1D4C69C2D798AC84D751
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _wcsncpy$LocalTime
                            • String ID:
                            • API String ID: 2945705084-0
                            • Opcode ID: f3f7cd520232804f11708c96fc84e862e386389e964f57497ee12f363e3b0faf
                            • Instruction ID: 1c3b7611e5317f5d166dc173f62d68485e78e0da24502208f26f0754d89ac11c
                            • Opcode Fuzzy Hash: f3f7cd520232804f11708c96fc84e862e386389e964f57497ee12f363e3b0faf
                            • Instruction Fuzzy Hash: 5D41A469D20628B6CB50EBB48C8EECF77A8EF04710F50855EF518E3162E638D715C7A9
                            APIs
                              • Part of subcall function 008048AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008038D3,?), ref: 008048C7
                              • Part of subcall function 008048AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008038D3,?), ref: 008048E0
                            • lstrcmpiW.KERNEL32(?,?), ref: 008038F3
                            • _wcscmp.LIBCMT ref: 0080390F
                            • MoveFileW.KERNEL32(?,?), ref: 00803927
                            • _wcscat.LIBCMT ref: 0080396F
                            • SHFileOperationW.SHELL32(?), ref: 008039DB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                            • String ID: \*.*
                            • API String ID: 1377345388-1173974218
                            • Opcode ID: dba785e4de983b2f10f737ffc58f1270fec31251be3ed12e445921629226edee
                            • Instruction ID: 6b932dc7683af8ef578426f1686915b1211f2e30ea115488ed2512583ddc951f
                            • Opcode Fuzzy Hash: dba785e4de983b2f10f737ffc58f1270fec31251be3ed12e445921629226edee
                            • Instruction Fuzzy Hash: 464181B15083849AD791EF64C885ADBBBECFF89340F40192EB489C3191EA74D649C752
                            APIs
                            • _memset.LIBCMT ref: 00827519
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008275C0
                            • IsMenu.USER32(?), ref: 008275D8
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00827620
                            • DrawMenuBar.USER32 ref: 00827633
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Menu$Item$DrawInfoInsert_memset
                            • String ID: 0
                            • API String ID: 3866635326-4108050209
                            • Opcode ID: 9d340bac04977a6e7feb9dcfdfee95262554392faa72269139f74190ff1130f5
                            • Instruction ID: 4220a5fccf97ab6b1efee5469876635c55ac01033e6ef22bca9a3733ab46feaa
                            • Opcode Fuzzy Hash: 9d340bac04977a6e7feb9dcfdfee95262554392faa72269139f74190ff1130f5
                            • Instruction Fuzzy Hash: BC413575A04619EFDB20DF66E984E9ABBF8FB18314F048129F915D7290D730AD90CFA0
                            APIs
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0082125C
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00821286
                            • FreeLibrary.KERNEL32(00000000), ref: 0082133D
                              • Part of subcall function 0082122D: RegCloseKey.ADVAPI32(?), ref: 008212A3
                              • Part of subcall function 0082122D: FreeLibrary.KERNEL32(?), ref: 008212F5
                              • Part of subcall function 0082122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00821318
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 008212E0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                            • String ID:
                            • API String ID: 395352322-0
                            • Opcode ID: 9d65a885c23162ed10f50d675bc0d23deeb5c3add65a0d03f33d1113f23e00ac
                            • Instruction ID: ca030b4f33ee8b8b09057c8e5eeb07da1bd440deaf631114431836aa548c9deb
                            • Opcode Fuzzy Hash: 9d65a885c23162ed10f50d675bc0d23deeb5c3add65a0d03f33d1113f23e00ac
                            • Instruction Fuzzy Hash: 0B31F6B1901119AEDF15DB94E889EFFB7BCFB18300F10416AB501E2251EA749E869AA0
                            APIs
                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0082655B
                            • GetWindowLongW.USER32(00F25798,000000F0), ref: 0082658E
                            • GetWindowLongW.USER32(00F25798,000000F0), ref: 008265C3
                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 008265F5
                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 0082661F
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00826630
                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0082664A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: LongWindow$MessageSend
                            • String ID:
                            • API String ID: 2178440468-0
                            • Opcode ID: a813452af25e1e279de05f1b302fa89d2437229bdec4bea63c1f396a5272f33e
                            • Instruction ID: 1de860a8cbab96b8cc2efafd57dde5672188b562be24c1f17a0a54797ff780f4
                            • Opcode Fuzzy Hash: a813452af25e1e279de05f1b302fa89d2437229bdec4bea63c1f396a5272f33e
                            • Instruction Fuzzy Hash: A5310330604160AFDB208F28ED85F5537E5FB5A710F194178F601CB2B6EB71ACA0DB81
                            APIs
                              • Part of subcall function 008180A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 008180CB
                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 008164D9
                            • WSAGetLastError.WSOCK32(00000000), ref: 008164E8
                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00816521
                            • connect.WSOCK32(00000000,?,00000010), ref: 0081652A
                            • WSAGetLastError.WSOCK32 ref: 00816534
                            • closesocket.WSOCK32(00000000), ref: 0081655D
                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00816576
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                            • String ID:
                            • API String ID: 910771015-0
                            • Opcode ID: bb18c6a7be93b71548198891f3246571a2af455e4e674ae0dbc13abb8fb3f331
                            • Instruction ID: 6e486fc2978d4392e12c3798b9bf89a567a9392e8716ffe3a6f47745a86f77f9
                            • Opcode Fuzzy Hash: bb18c6a7be93b71548198891f3246571a2af455e4e674ae0dbc13abb8fb3f331
                            • Instruction Fuzzy Hash: 0C31B031600118AFDB109F24CC89BFA7BBDFF45724F008069FA45E7291EB74A955CAA1
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007FE0FA
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007FE120
                            • SysAllocString.OLEAUT32(00000000), ref: 007FE123
                            • SysAllocString.OLEAUT32 ref: 007FE144
                            • SysFreeString.OLEAUT32 ref: 007FE14D
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 007FE167
                            • SysAllocString.OLEAUT32(?), ref: 007FE175
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: 1540b320b7a36bf1f4eac54af3a62afb9b56aabf8862632e34b88a85cf778c8b
                            • Instruction ID: 53b8871c866c00ebb7d63ab66588f7d99fdd33212d3fa83adab505282cf3293f
                            • Opcode Fuzzy Hash: 1540b320b7a36bf1f4eac54af3a62afb9b56aabf8862632e34b88a85cf778c8b
                            • Instruction Fuzzy Hash: 3E21303560420CAF9B20AFA9DC89DBB77ECFB09760B508235FA15CB261DA74DC41CB64
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                            • API String ID: 1038674560-2734436370
                            • Opcode ID: 19e5075b2af247a85084f045f3148010d8af7b66c32328379141d24bdf369287
                            • Instruction ID: a71e1aedf2581018dbfcdaeaf98fbda0b39c538a452cfe0ab97007467933184f
                            • Opcode Fuzzy Hash: 19e5075b2af247a85084f045f3148010d8af7b66c32328379141d24bdf369287
                            • Instruction Fuzzy Hash: B3216772204628E6D230A634DC16FBB7398EF91310F108039FA8686341EF5CA982D3A1
                            APIs
                              • Part of subcall function 007A1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 007A1D73
                              • Part of subcall function 007A1D35: GetStockObject.GDI32(00000011), ref: 007A1D87
                              • Part of subcall function 007A1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 007A1D91
                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 008278A1
                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 008278AE
                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 008278B9
                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 008278C8
                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 008278D4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$CreateObjectStockWindow
                            • String ID: Msctls_Progress32
                            • API String ID: 1025951953-3636473452
                            • Opcode ID: bba35a1a1060b1395ad6c0f0cb29b2d3257c4e43d33187e16f059a2b3ba6aae6
                            • Instruction ID: 2013c9c681d55a98935b49222dd58454c4920573a71f4def2bd0e756a857bfa1
                            • Opcode Fuzzy Hash: bba35a1a1060b1395ad6c0f0cb29b2d3257c4e43d33187e16f059a2b3ba6aae6
                            • Instruction Fuzzy Hash: 5F118EB2510229BFEF159E61CC85EE77F6DFF08798F014124FA04A2090D7729C61DBA4
                            APIs
                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,007C4292,?), ref: 007C41E3
                            • GetProcAddress.KERNEL32(00000000), ref: 007C41EA
                            • EncodePointer.KERNEL32(00000000), ref: 007C41F6
                            • DecodePointer.KERNEL32(00000001,007C4292,?), ref: 007C4213
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                            • String ID: RoInitialize$combase.dll
                            • API String ID: 3489934621-340411864
                            • Opcode ID: c558c6a41061892d731e54f65582c8784c00d63d00f000147986639b9a79819c
                            • Instruction ID: dfa3005bc2ff849a712fc6b69ee7a1adfaf8d32888df172845a47e9d1eeadcf2
                            • Opcode Fuzzy Hash: c558c6a41061892d731e54f65582c8784c00d63d00f000147986639b9a79819c
                            • Instruction Fuzzy Hash: DBE012B0590304AFEB205F70EC0DB083AA5B756702F51B438F621D51A1DBFA4092CF00
                            APIs
                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,007C41B8), ref: 007C42B8
                            • GetProcAddress.KERNEL32(00000000), ref: 007C42BF
                            • EncodePointer.KERNEL32(00000000), ref: 007C42CA
                            • DecodePointer.KERNEL32(007C41B8), ref: 007C42E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                            • String ID: RoUninitialize$combase.dll
                            • API String ID: 3489934621-2819208100
                            • Opcode ID: 391a810a5564afbaa53e7b20b225c6a16fd66408178f9ceb8a56a2c55e1f3b61
                            • Instruction ID: 8fc459a5acab353a8e6632d080e74d1907578c7415e3995575e78df2d486abf9
                            • Opcode Fuzzy Hash: 391a810a5564afbaa53e7b20b225c6a16fd66408178f9ceb8a56a2c55e1f3b61
                            • Instruction Fuzzy Hash: 2AE0B678581300EBEB209B60FD0DB083AB4F726B42F11A03AF211E12A1CBB84591CB58
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove$__itow__swprintf
                            • String ID:
                            • API String ID: 3253778849-0
                            • Opcode ID: 93b3fe1bf09b770244ec23dce923942e0d514e4956ba1ddd2cbb217d59e0d148
                            • Instruction ID: 86948bcac243fba0bab8b8e6ec5bf73e259762429e9e5d1b3e5bd38029ceca19
                            • Opcode Fuzzy Hash: 93b3fe1bf09b770244ec23dce923942e0d514e4956ba1ddd2cbb217d59e0d148
                            • Instruction Fuzzy Hash: 9A619E3050025ADBDF11EF24CC85EFE3BA8EF85308F444629F9559B1D2EB38A961CB61
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 008210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00820038,?,?), ref: 008210BC
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00820548
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00820588
                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 008205AB
                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 008205D4
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00820617
                            • RegCloseKey.ADVAPI32(00000000), ref: 00820624
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                            • String ID:
                            • API String ID: 4046560759-0
                            • Opcode ID: d9e5b7ea0ebb3543266242d9b087bd94ed8ff3b48b83a4dfdcc3f4090cc53feb
                            • Instruction ID: 59ac6b32b03f80cc4be17e1f5487e719a23d3df47ee47bdf0baba0e2915d58fd
                            • Opcode Fuzzy Hash: d9e5b7ea0ebb3543266242d9b087bd94ed8ff3b48b83a4dfdcc3f4090cc53feb
                            • Instruction Fuzzy Hash: D6514831208204EFCB14EB24D889E6BBBE8FF85314F04892DF545972A2DB35E945CF52
                            APIs
                            • GetMenu.USER32(?), ref: 00825A82
                            • GetMenuItemCount.USER32(00000000), ref: 00825AB9
                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00825AE1
                            • GetMenuItemID.USER32(?,?), ref: 00825B50
                            • GetSubMenu.USER32(?,?), ref: 00825B5E
                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 00825BAF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Menu$Item$CountMessagePostString
                            • String ID:
                            • API String ID: 650687236-0
                            • Opcode ID: 7da4f8d8985935622a691f49a4149867dd2401672bdce721c4c6a6135dae8e9d
                            • Instruction ID: 7be7cf1dad6d468772170b1a891aaeeaae2783b8530564f2ffceb879ce8ec257
                            • Opcode Fuzzy Hash: 7da4f8d8985935622a691f49a4149867dd2401672bdce721c4c6a6135dae8e9d
                            • Instruction Fuzzy Hash: C9514C35A40629EFCB11AF64D845AAEB7B4FF48320F108569E916F7251CB74AE81CB90
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 007FF3F7
                            • VariantClear.OLEAUT32(00000013), ref: 007FF469
                            • VariantClear.OLEAUT32(00000000), ref: 007FF4C4
                            • _memmove.LIBCMT ref: 007FF4EE
                            • VariantClear.OLEAUT32(?), ref: 007FF53B
                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007FF569
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Variant$Clear$ChangeInitType_memmove
                            • String ID:
                            • API String ID: 1101466143-0
                            • Opcode ID: 8a5e1848a236c88b577b26f04240f727c7454fe4c7dff8c231eb90a68ce4c0e5
                            • Instruction ID: b41dca3ecbfaa1b25d9ddd2494fe91672a9e011bde759265075869fbbaa12586
                            • Opcode Fuzzy Hash: 8a5e1848a236c88b577b26f04240f727c7454fe4c7dff8c231eb90a68ce4c0e5
                            • Instruction Fuzzy Hash: E4516BB5A00209EFCB10DF58D884AAAB7B9FF4C314B158169EA59DB301D734E912CBA0
                            APIs
                            • _memset.LIBCMT ref: 00802747
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00802792
                            • IsMenu.USER32(00000000), ref: 008027B2
                            • CreatePopupMenu.USER32 ref: 008027E6
                            • GetMenuItemCount.USER32(000000FF), ref: 00802844
                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00802875
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                            • String ID:
                            • API String ID: 3311875123-0
                            • Opcode ID: 2bc7110075131a7ad03536fc18655ef5a5ef19f2b9f1827cf2c7669339124e0d
                            • Instruction ID: 4c3e3581ee18fc50a62ccb3dee9ff6654ef820eec61701a612977b24667bbf24
                            • Opcode Fuzzy Hash: 2bc7110075131a7ad03536fc18655ef5a5ef19f2b9f1827cf2c7669339124e0d
                            • Instruction Fuzzy Hash: 79518C74A0020AEBDB65CF68CC8CAAEBBF5FF44314F148169E821DB2D1D7B08944CB51
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • BeginPaint.USER32(?,?,?,?,?,?), ref: 007A179A
                            • GetWindowRect.USER32(?,?), ref: 007A17FE
                            • ScreenToClient.USER32(?,?), ref: 007A181B
                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007A182C
                            • EndPaint.USER32(?,?), ref: 007A1876
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                            • String ID:
                            • API String ID: 1827037458-0
                            • Opcode ID: 037aa63d259e8a14648bb5502777bd5b09da3037765dcf1d5a9042d1ace9e0f7
                            • Instruction ID: 0d915f6fa6eefd87caea16d57d54b2c615b89b042fdc5feb693907757c530fee
                            • Opcode Fuzzy Hash: 037aa63d259e8a14648bb5502777bd5b09da3037765dcf1d5a9042d1ace9e0f7
                            • Instruction Fuzzy Hash: 74419D70500240AFD710DF24C884BBA7BF8FB8A734F044629F6A4872A2D7789845DB62
                            APIs
                            • ShowWindow.USER32(008667B0,00000000,00F25798,?,?,008667B0,?,0082B862,?,?), ref: 0082B9CC
                            • EnableWindow.USER32(00000000,00000000), ref: 0082B9F0
                            • ShowWindow.USER32(008667B0,00000000,00F25798,?,?,008667B0,?,0082B862,?,?), ref: 0082BA50
                            • ShowWindow.USER32(00000000,00000004,?,0082B862,?,?), ref: 0082BA62
                            • EnableWindow.USER32(00000000,00000001), ref: 0082BA86
                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0082BAA9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$Show$Enable$MessageSend
                            • String ID:
                            • API String ID: 642888154-0
                            • Opcode ID: 799e3de0940a484ae9cb3a6719ba6bfa3dd0e0ec95875513f4408783f1863dc6
                            • Instruction ID: d13af85b956e2e88fd0a9d2f0eddc39c4ac2bf724b126f0468c1531e069fbb4c
                            • Opcode Fuzzy Hash: 799e3de0940a484ae9cb3a6719ba6bfa3dd0e0ec95875513f4408783f1863dc6
                            • Instruction Fuzzy Hash: 68415130602261AFDB21CF14E489B957FE0FB05310F1881B9FA49DF6A2D731E886CB51
                            APIs
                            • GetForegroundWindow.USER32(?,?,?,?,?,?,00815134,?,?,00000000,00000001), ref: 008173BF
                              • Part of subcall function 00813C94: GetWindowRect.USER32(?,?), ref: 00813CA7
                            • GetDesktopWindow.USER32 ref: 008173E9
                            • GetWindowRect.USER32(00000000), ref: 008173F0
                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00817422
                              • Part of subcall function 008054E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0080555E
                            • GetCursorPos.USER32(?), ref: 0081744E
                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008174AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                            • String ID:
                            • API String ID: 4137160315-0
                            • Opcode ID: d5fd864bab950dfa5c8e43e9a710dd4664127cf1edfe9eb67f3f6c629a7fcd3c
                            • Instruction ID: a225531489557669282ba82dbaaaa101e28d45ca0e5ac14e58f9922a5b430aec
                            • Opcode Fuzzy Hash: d5fd864bab950dfa5c8e43e9a710dd4664127cf1edfe9eb67f3f6c629a7fcd3c
                            • Instruction Fuzzy Hash: 6031C172508315ABD720DF14D849E9BBBA9FF88314F004929F589D7192C630EA89CBD6
                            APIs
                              • Part of subcall function 007F85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F8608
                              • Part of subcall function 007F85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F8612
                              • Part of subcall function 007F85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F8621
                              • Part of subcall function 007F85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F8628
                              • Part of subcall function 007F85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F863E
                            • GetLengthSid.ADVAPI32(?,00000000,007F8977), ref: 007F8DAC
                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007F8DB8
                            • HeapAlloc.KERNEL32(00000000), ref: 007F8DBF
                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 007F8DD8
                            • GetProcessHeap.KERNEL32(00000000,00000000,007F8977), ref: 007F8DEC
                            • HeapFree.KERNEL32(00000000), ref: 007F8DF3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                            • String ID:
                            • API String ID: 3008561057-0
                            • Opcode ID: bfde6055a1dc3161c2a6a3af9bfb7334fe13378a97b7542bc1a294be5a5ce330
                            • Instruction ID: 01cd753e62942e3c241310352c66bb7c9782a5f424412fa61cc9d0ad8600575c
                            • Opcode Fuzzy Hash: bfde6055a1dc3161c2a6a3af9bfb7334fe13378a97b7542bc1a294be5a5ce330
                            • Instruction Fuzzy Hash: 2B11E131600609FFDB648F64CC09BBE7779FF48315F10802AEA4597251CB399901CB61
                            APIs
                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007F8B2A
                            • OpenProcessToken.ADVAPI32(00000000), ref: 007F8B31
                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007F8B40
                            • CloseHandle.KERNEL32(00000004), ref: 007F8B4B
                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007F8B7A
                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 007F8B8E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                            • String ID:
                            • API String ID: 1413079979-0
                            • Opcode ID: 6c7709d9cb70c6a6b08deac65451ddad67727fec59f000faf15c80cb72b370c9
                            • Instruction ID: 6f2150a3068fd040a521167972068714a9098e3c7019a85d3fe26f28d9442118
                            • Opcode Fuzzy Hash: 6c7709d9cb70c6a6b08deac65451ddad67727fec59f000faf15c80cb72b370c9
                            • Instruction Fuzzy Hash: FC1147B250024DABDB118FA4ED49FEA7BB9FB08314F048065FF04A2261C7768D61EB61
                            APIs
                              • Part of subcall function 007A12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A134D
                              • Part of subcall function 007A12F3: SelectObject.GDI32(?,00000000), ref: 007A135C
                              • Part of subcall function 007A12F3: BeginPath.GDI32(?), ref: 007A1373
                              • Part of subcall function 007A12F3: SelectObject.GDI32(?,00000000), ref: 007A139C
                            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0082C1C4
                            • LineTo.GDI32(00000000,00000003,?), ref: 0082C1D8
                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0082C1E6
                            • LineTo.GDI32(00000000,00000000,?), ref: 0082C1F6
                            • EndPath.GDI32(00000000), ref: 0082C206
                            • StrokePath.GDI32(00000000), ref: 0082C216
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                            • String ID:
                            • API String ID: 43455801-0
                            • Opcode ID: 1aca5af80fb5c5bcf99a70c42eb3d4d0cf8be77d2b469c7cdfebbe4b35e2c4b6
                            • Instruction ID: c65753130a94259fc2e43e521968254c94b896185c6cf456fcbb8ae4e6409e9e
                            • Opcode Fuzzy Hash: 1aca5af80fb5c5bcf99a70c42eb3d4d0cf8be77d2b469c7cdfebbe4b35e2c4b6
                            • Instruction Fuzzy Hash: 2111FA7640014CBFDF129F90DC48EAA7FADFB04354F048025BA18861A2D7719D65DBA0
                            APIs
                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007C03D3
                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 007C03DB
                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007C03E6
                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007C03F1
                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 007C03F9
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 007C0401
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Virtual
                            • String ID:
                            • API String ID: 4278518827-0
                            • Opcode ID: e8417be18d06ccd8dc088b363afc351c8cc16c9d955d6959a4a68a9a14f910c3
                            • Instruction ID: 18c440b4f69d0515324d732caef61ea85b39d855be75d0e0ece90238cb8cd69b
                            • Opcode Fuzzy Hash: e8417be18d06ccd8dc088b363afc351c8cc16c9d955d6959a4a68a9a14f910c3
                            • Instruction Fuzzy Hash: 3B016CB09027597DE3008F5A8C85B52FFB8FF19354F00411BA15C47942C7F5A868CBE5
                            APIs
                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0080569B
                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 008056B1
                            • GetWindowThreadProcessId.USER32(?,?), ref: 008056C0
                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008056CF
                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008056D9
                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008056E0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                            • String ID:
                            • API String ID: 839392675-0
                            • Opcode ID: 55e61727246806824d73f79fcfbeb4ff570c9cd9048b8fd7cddafef028311f0d
                            • Instruction ID: 151574a506365b003996fcec483283be885e98d96c9470ba8f669b118f329462
                            • Opcode Fuzzy Hash: 55e61727246806824d73f79fcfbeb4ff570c9cd9048b8fd7cddafef028311f0d
                            • Instruction Fuzzy Hash: 12F06D32241118BBE7315BA2DC0EEAB7B7CFBDAB11F004179FA00D109296A11A02C6B5
                            APIs
                            • InterlockedExchange.KERNEL32(?,?), ref: 008074E5
                            • EnterCriticalSection.KERNEL32(?,?,007B1044,?,?), ref: 008074F6
                            • TerminateThread.KERNEL32(00000000,000001F6,?,007B1044,?,?), ref: 00807503
                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,007B1044,?,?), ref: 00807510
                              • Part of subcall function 00806ED7: CloseHandle.KERNEL32(00000000,?,0080751D,?,007B1044,?,?), ref: 00806EE1
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00807523
                            • LeaveCriticalSection.KERNEL32(?,?,007B1044,?,?), ref: 0080752A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                            • String ID:
                            • API String ID: 3495660284-0
                            • Opcode ID: a5ba85c583c9605ae8b62142f33388608c2acfee66ef2d1de03cb3d53410207a
                            • Instruction ID: 64b2dcc18f74e1bf52bf97364fffb41a55f5f2bd8710148dec2bb45034fcea69
                            • Opcode Fuzzy Hash: a5ba85c583c9605ae8b62142f33388608c2acfee66ef2d1de03cb3d53410207a
                            • Instruction Fuzzy Hash: 74F05E3A540612EBDB621B64FD8D9EB773AFF46302B104531F302910B6DB755812CB50
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007F8E7F
                            • UnloadUserProfile.USERENV(?,?), ref: 007F8E8B
                            • CloseHandle.KERNEL32(?), ref: 007F8E94
                            • CloseHandle.KERNEL32(?), ref: 007F8E9C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 007F8EA5
                            • HeapFree.KERNEL32(00000000), ref: 007F8EAC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                            • String ID:
                            • API String ID: 146765662-0
                            • Opcode ID: 96361f4d526cb948933754f9f325aedc05e92415932ae07a94755b03b94215ea
                            • Instruction ID: 6a7a71bb1e7f07662b54f5c50f2b33a8904a55f23f1e7b9d411837f38bf3e78b
                            • Opcode Fuzzy Hash: 96361f4d526cb948933754f9f325aedc05e92415932ae07a94755b03b94215ea
                            • Instruction Fuzzy Hash: 30E0C236004001FBDA125FE1ED0C91ABB79FB89322B508230F31981171CB329432DB50
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00818928
                            • CharUpperBuffW.USER32(?,?), ref: 00818A37
                            • VariantClear.OLEAUT32(?), ref: 00818BAF
                              • Part of subcall function 00807804: VariantInit.OLEAUT32(00000000), ref: 00807844
                              • Part of subcall function 00807804: VariantCopy.OLEAUT32(00000000,?), ref: 0080784D
                              • Part of subcall function 00807804: VariantClear.OLEAUT32(00000000), ref: 00807859
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                            • API String ID: 4237274167-1221869570
                            • Opcode ID: 65e62ea3e621b07385c1b7e6cf3ef941478e4197d4abc9d0d8bc58b3900693cf
                            • Instruction ID: feb2fe54c2b1be9af355962e67f7fcaba695a8b3d931cc34c0b79d51e4bcd4a7
                            • Opcode Fuzzy Hash: 65e62ea3e621b07385c1b7e6cf3ef941478e4197d4abc9d0d8bc58b3900693cf
                            • Instruction Fuzzy Hash: 60912771608305DFC710DF24C48599ABBE8FF89314F048A6EF99ACB262DB31E945CB52
                            APIs
                              • Part of subcall function 007BFEC6: _wcscpy.LIBCMT ref: 007BFEE9
                            • _memset.LIBCMT ref: 00803077
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008030A6
                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00803159
                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00803187
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                            • String ID: 0
                            • API String ID: 4152858687-4108050209
                            • Opcode ID: dcdddf236f2c62ae67cebe3322e784f4a099831d97e1216c8d4cbe1a615a527f
                            • Instruction ID: 278e72f99d318d793862f577373161a2097c333ff251628fe46a441eaf5ee7ab
                            • Opcode Fuzzy Hash: dcdddf236f2c62ae67cebe3322e784f4a099831d97e1216c8d4cbe1a615a527f
                            • Instruction Fuzzy Hash: C851A031609301AAD7A59F28CC49A6BB7ECFF89354F044A2EF895D31D1DB74CA448792
                            APIs
                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007FDAC5
                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007FDAFB
                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007FDB0C
                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007FDB8E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorMode$AddressCreateInstanceProc
                            • String ID: DllGetClassObject
                            • API String ID: 753597075-1075368562
                            • Opcode ID: 173b792759775415a1e9878dc79f1c4bef90c5bcaaeca36a1cc40804aa460324
                            • Instruction ID: aa0123af8bd5a276f5852f52bd3eeeed6c191a761538c369c8cd7450118f2de4
                            • Opcode Fuzzy Hash: 173b792759775415a1e9878dc79f1c4bef90c5bcaaeca36a1cc40804aa460324
                            • Instruction Fuzzy Hash: 614160B1600208EFDB25CF54C884AAA7BBAFF44310F1581A9AE059F305D7B5DD45DBA0
                            APIs
                            • _memset.LIBCMT ref: 00802CAF
                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00802CCB
                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00802D11
                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00866890,00000000), ref: 00802D5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Menu$Delete$InfoItem_memset
                            • String ID: 0
                            • API String ID: 1173514356-4108050209
                            • Opcode ID: c45cbe7aa5b573952199798821fb1708eb08269599b85a60b3cc49e4af458b02
                            • Instruction ID: 468ed11487144b3112db74118ea093e0695225e37fd4080e1b7fbdef6e72d006
                            • Opcode Fuzzy Hash: c45cbe7aa5b573952199798821fb1708eb08269599b85a60b3cc49e4af458b02
                            • Instruction Fuzzy Hash: 32419D312053069FD764DF28CC48B1ABBA8FF85320F00466DE965D72D1D7B0E904CB92
                            APIs
                            • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0081DAD9
                              • Part of subcall function 007A79AB: _memmove.LIBCMT ref: 007A79F9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharLower_memmove
                            • String ID: cdecl$none$stdcall$winapi
                            • API String ID: 3425801089-567219261
                            • Opcode ID: dbe92824f7272a5c3fc4f00c3bf131b5763883b363729a4a591178c977271fba
                            • Instruction ID: 26c2ccbff3f7159cc3b1f3c3717688596af509239e48ebf4745f098e9daccadd
                            • Opcode Fuzzy Hash: dbe92824f7272a5c3fc4f00c3bf131b5763883b363729a4a591178c977271fba
                            • Instruction Fuzzy Hash: 0A317371604619DBCF10DF54CC81AEEB7B8FF55320B108629E866D76D1DB35A94ACB80
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 007FB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 007FB0E7
                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007F93F6
                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007F9409
                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 007F9439
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$_memmove$ClassName
                            • String ID: ComboBox$ListBox
                            • API String ID: 365058703-1403004172
                            • Opcode ID: bbf7b6e087e2637e6dcc5afd0e9827eb8506a6eff26d7122ecfedb488cb58a47
                            • Instruction ID: 815f260774cb1fa7b78420cbaed1cd1343c8fd3fff99c9c62756bb85834c2ae3
                            • Opcode Fuzzy Hash: bbf7b6e087e2637e6dcc5afd0e9827eb8506a6eff26d7122ecfedb488cb58a47
                            • Instruction Fuzzy Hash: 2721D5B1A00108FEDB18AB64DC89DFFB778EF55350B108229FA25972E1DB3D4A4AD650
                            APIs
                              • Part of subcall function 007A1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 007A1D73
                              • Part of subcall function 007A1D35: GetStockObject.GDI32(00000011), ref: 007A1D87
                              • Part of subcall function 007A1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 007A1D91
                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 008266D0
                            • LoadLibraryW.KERNEL32(?), ref: 008266D7
                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 008266EC
                            • DestroyWindow.USER32(?), ref: 008266F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                            • String ID: SysAnimate32
                            • API String ID: 4146253029-1011021900
                            • Opcode ID: ba3aa5eb4c62f8814369b9a70b635eed691d2b139f11de90964f7965b9201ab4
                            • Instruction ID: 105befa2db7a3f359e8ea7b75018b571191a85f01936168ee01c1b115affd6a7
                            • Opcode Fuzzy Hash: ba3aa5eb4c62f8814369b9a70b635eed691d2b139f11de90964f7965b9201ab4
                            • Instruction Fuzzy Hash: 1E215B7120021AEFEF104E64FC84EBB77ADFB69768F104629FA11D21A0E7719CA19760
                            APIs
                            • GetStdHandle.KERNEL32(0000000C), ref: 0080705E
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00807091
                            • GetStdHandle.KERNEL32(0000000C), ref: 008070A3
                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 008070DD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateHandle$FilePipe
                            • String ID: nul
                            • API String ID: 4209266947-2873401336
                            • Opcode ID: 660a87bad44bcc8b4503d614d665fc13d591779bc6e65836ea585aeeccbf1c8e
                            • Instruction ID: 0b8d390e214d6ec2209cccd5984a6fda54187662a29310b19c0fd71000113e88
                            • Opcode Fuzzy Hash: 660a87bad44bcc8b4503d614d665fc13d591779bc6e65836ea585aeeccbf1c8e
                            • Instruction Fuzzy Hash: 7C218E74A04609ABDB609F28DC05A9A77B8FF55724F208B29FDA0D72D0E770A851CB50
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 0080712B
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0080715D
                            • GetStdHandle.KERNEL32(000000F6), ref: 0080716E
                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 008071A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateHandle$FilePipe
                            • String ID: nul
                            • API String ID: 4209266947-2873401336
                            • Opcode ID: 3f1e0d2a1630040e9eb44cd13c81aefd24b5b9f8cc5a7e2fc205e21270901808
                            • Instruction ID: 5cbbd62b30ede35c5cdb64ed58105e78ba5201e75d8ce72f3516f0fc2fddbf8e
                            • Opcode Fuzzy Hash: 3f1e0d2a1630040e9eb44cd13c81aefd24b5b9f8cc5a7e2fc205e21270901808
                            • Instruction Fuzzy Hash: E321A475A042059BDB609F689C05A9977A8FF55724F204619FDA0D32D0D770A851C751
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0080AEBF
                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0080AF13
                            • __swprintf.LIBCMT ref: 0080AF2C
                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0082F910), ref: 0080AF6A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume__swprintf
                            • String ID: %lu
                            • API String ID: 3164766367-685833217
                            • Opcode ID: b4ecc4629446458f61f7c6aa4e055bb80d9202512afc1ae431c68cd45898b511
                            • Instruction ID: 613583268b9c8656381e9c548d9d86c84bb30248e10cd9c1abfeda8e5bb59c92
                            • Opcode Fuzzy Hash: b4ecc4629446458f61f7c6aa4e055bb80d9202512afc1ae431c68cd45898b511
                            • Instruction Fuzzy Hash: 69213275600209EFCB10DB54CD89DAE7BB8FF89704B108169F905EB352DA35EA45CB61
                            APIs
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                              • Part of subcall function 007FA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 007FA399
                              • Part of subcall function 007FA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 007FA3AC
                              • Part of subcall function 007FA37C: GetCurrentThreadId.KERNEL32 ref: 007FA3B3
                              • Part of subcall function 007FA37C: AttachThreadInput.USER32(00000000), ref: 007FA3BA
                            • GetFocus.USER32 ref: 007FA554
                              • Part of subcall function 007FA3C5: GetParent.USER32(?), ref: 007FA3D3
                            • GetClassNameW.USER32(?,?,00000100), ref: 007FA59D
                            • EnumChildWindows.USER32(?,007FA615), ref: 007FA5C5
                            • __swprintf.LIBCMT ref: 007FA5DF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                            • String ID: %s%d
                            • API String ID: 1941087503-1110647743
                            • Opcode ID: 86112ebf381abb22ccbf765964f335276b74587d2c9ca77920e8337c90c20ad4
                            • Instruction ID: a36d83c2626f3bd2e9b522180477a75d865469a649fae4e7bf115e67bc24eb08
                            • Opcode Fuzzy Hash: 86112ebf381abb22ccbf765964f335276b74587d2c9ca77920e8337c90c20ad4
                            • Instruction Fuzzy Hash: F01190B1200209BBDF107F60DC89FBA37B8EF49700F048075BA0CAA252CA785945CB75
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 00802048
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharUpper
                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                            • API String ID: 3964851224-769500911
                            • Opcode ID: 2dc1a779ab6a0f7510bc70731ef9751a797644bbdfdd8cf00bd57cc4aa35010f
                            • Instruction ID: 1c7a1a39240845d6adbb9b65ebec7a7e6aababcb04639b8f7a15fadd0bea4911
                            • Opcode Fuzzy Hash: 2dc1a779ab6a0f7510bc70731ef9751a797644bbdfdd8cf00bd57cc4aa35010f
                            • Instruction Fuzzy Hash: 15115E30941609DFCF44EFB4D8959EEB7B4FF16304B108568D856A7292EB725E0ACB90
                            APIs
                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0081EF1B
                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0081EF4B
                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0081F07E
                            • CloseHandle.KERNEL32(?), ref: 0081F0FF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                            • String ID:
                            • API String ID: 2364364464-0
                            • Opcode ID: b3f678e3cf6ecb2fa7504dc0148d5eb523e9d9e6fdc055e46d43df8feee89011
                            • Instruction ID: 0ec46335f92444d21dff66d9e0987008e7daf37955b991e4230a9888777957e3
                            • Opcode Fuzzy Hash: b3f678e3cf6ecb2fa7504dc0148d5eb523e9d9e6fdc055e46d43df8feee89011
                            • Instruction Fuzzy Hash: B8815E71604700DFD720DF28C84AB6AB7E9EF88720F14892DFA95DB292DB74AC41CB51
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 008210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00820038,?,?), ref: 008210BC
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00820388
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008203C7
                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0082040E
                            • RegCloseKey.ADVAPI32(?,?), ref: 0082043A
                            • RegCloseKey.ADVAPI32(00000000), ref: 00820447
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                            • String ID:
                            • API String ID: 3440857362-0
                            • Opcode ID: 22ae8b89ad0baf3c9ead0a55a241ecb48435584762f41513c5e9b195ca6b2b80
                            • Instruction ID: 9a0e253ffad0c7638114c47244d1e18e1eb5847ff4ddc6c374beeaa6257ee05e
                            • Opcode Fuzzy Hash: 22ae8b89ad0baf3c9ead0a55a241ecb48435584762f41513c5e9b195ca6b2b80
                            • Instruction Fuzzy Hash: 6B514A71208204EFD704EF64DC89E6EB7E8FF84718F04892DB695972A2DB34E945CB52
                            APIs
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0081DC3B
                            • GetProcAddress.KERNEL32(00000000,?), ref: 0081DCBE
                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0081DCDA
                            • GetProcAddress.KERNEL32(00000000,?), ref: 0081DD1B
                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0081DD35
                              • Part of subcall function 007A5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00807B20,?,?,00000000), ref: 007A5B8C
                              • Part of subcall function 007A5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00807B20,?,?,00000000,?,?), ref: 007A5BB0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                            • String ID:
                            • API String ID: 327935632-0
                            • Opcode ID: 1d67f2e8bd44637ef79300855242c8d93957f12eb0b385313869f396b559a0d9
                            • Instruction ID: c5b6beb42b72567e570390eb1017b10034bb1b6893052d1bd17e4fcb955a8e90
                            • Opcode Fuzzy Hash: 1d67f2e8bd44637ef79300855242c8d93957f12eb0b385313869f396b559a0d9
                            • Instruction Fuzzy Hash: 5A510875A00609DFCB00EF68C4889ADB7F8FF59320B14C569E915AB322DB34AD85CB91
                            APIs
                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0080E88A
                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0080E8B3
                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0080E8F2
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0080E917
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0080E91F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                            • String ID:
                            • API String ID: 1389676194-0
                            • Opcode ID: 09ddbc75729ae7ec3a5316d12c91b63a7c7fb2a8d45915cc39ec6fd4b64587f2
                            • Instruction ID: a2d3dca480c28c09feb8dc4e3873275f6f37857af5fcb1e2633cdf43ab8bee4f
                            • Opcode Fuzzy Hash: 09ddbc75729ae7ec3a5316d12c91b63a7c7fb2a8d45915cc39ec6fd4b64587f2
                            • Instruction Fuzzy Hash: 76512835A00205EFCB11EF64C985AAEBBF5FF49310B1480A9E949AB362DB35ED51CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f17f1da314be2854379bbf21345080e3cc59467a174c380db6d05bc26f7a6b10
                            • Instruction ID: 3a364df2d7ad46e67829558cc6e8907028fe98d093eda318011b9bdc53ccc78a
                            • Opcode Fuzzy Hash: f17f1da314be2854379bbf21345080e3cc59467a174c380db6d05bc26f7a6b10
                            • Instruction Fuzzy Hash: D841FF35900228AFC728DF28EC48FA9BBA8FF09310F154265F915E72E1D770AD81DA91
                            APIs
                            • GetCursorPos.USER32(?), ref: 007A2357
                            • ScreenToClient.USER32(008667B0,?), ref: 007A2374
                            • GetAsyncKeyState.USER32(00000001), ref: 007A2399
                            • GetAsyncKeyState.USER32(00000002), ref: 007A23A7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AsyncState$ClientCursorScreen
                            • String ID:
                            • API String ID: 4210589936-0
                            • Opcode ID: 635c56812399c66f41362606574cd1bd3e6afbc796dd9c8e5fb9172e177aecc8
                            • Instruction ID: a1e1eff9be5acd0cccfa0c71c1bbd654ae54941e1e1f572f5b3a8e991d9153aa
                            • Opcode Fuzzy Hash: 635c56812399c66f41362606574cd1bd3e6afbc796dd9c8e5fb9172e177aecc8
                            • Instruction Fuzzy Hash: 3E41837150411AFBDF169FA8C848AEEBB74FF46320F20432AF92492291C7386995DF91
                            APIs
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007F695D
                            • TranslateAcceleratorW.USER32(?,?,?), ref: 007F69A9
                            • TranslateMessage.USER32(?), ref: 007F69D2
                            • DispatchMessageW.USER32(?), ref: 007F69DC
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007F69EB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                            • String ID:
                            • API String ID: 2108273632-0
                            • Opcode ID: a9cc37f8d12aeba64ad470c4afab323d4e94300afeb6620e3292d1946e485a2b
                            • Instruction ID: f273f2eb6b45c28ba36898b236012c377352e350f5dd28b08a4e52c8e4891d35
                            • Opcode Fuzzy Hash: a9cc37f8d12aeba64ad470c4afab323d4e94300afeb6620e3292d1946e485a2b
                            • Instruction Fuzzy Hash: 9C31F87150424AAADB20CF74CC44FB67BBCFB11304F10817DE621D72A1E7B9A899D790
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 007F8F12
                            • PostMessageW.USER32(?,00000201,00000001), ref: 007F8FBC
                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 007F8FC4
                            • PostMessageW.USER32(?,00000202,00000000), ref: 007F8FD2
                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 007F8FDA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessagePostSleep$RectWindow
                            • String ID:
                            • API String ID: 3382505437-0
                            • Opcode ID: c2d7095a873d5c13c779d379d3397188204647685c58b65a99f12807d32fa663
                            • Instruction ID: 9ea9eaa0437048ee9c997fe93d9fc5907318e546c432a07abfffd9fd149ec328
                            • Opcode Fuzzy Hash: c2d7095a873d5c13c779d379d3397188204647685c58b65a99f12807d32fa663
                            • Instruction Fuzzy Hash: 6331DC7150021DEFDB10CF68DD4CAAE7BB6FB04315F108229FA24AA2D1C7B49910CB92
                            APIs
                            • IsWindowVisible.USER32(?), ref: 007FB6C7
                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007FB6E4
                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007FB71C
                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007FB742
                            • _wcsstr.LIBCMT ref: 007FB74C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                            • String ID:
                            • API String ID: 3902887630-0
                            • Opcode ID: 18f2b90e5a39853f6d6e0a92f485e951e7a19f36ae8b6e74a3d9cbf9159ba6e7
                            • Instruction ID: 7eeaa4ab0b71a12f4cf6983fa34cf9e897da63352ae31e90070dc902c77afd6f
                            • Opcode Fuzzy Hash: 18f2b90e5a39853f6d6e0a92f485e951e7a19f36ae8b6e74a3d9cbf9159ba6e7
                            • Instruction Fuzzy Hash: C121DD71204208FAEB255B35DC49E7B7BA9DF49710F10803EFE05C9251EB65DC41D660
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • GetWindowLongW.USER32(?,000000F0), ref: 0082B44C
                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0082B471
                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0082B489
                            • GetSystemMetrics.USER32(00000004), ref: 0082B4B2
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00811184,00000000), ref: 0082B4D0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$Long$MetricsSystem
                            • String ID:
                            • API String ID: 2294984445-0
                            • Opcode ID: f51f281e95a2fd0eecc2552af4f4d266541640cfa32dd10eb26e21e27db96240
                            • Instruction ID: 8eb9a6a2f12def20bd97387f3d9747d16c8a3f7c96f500121877cc56c0394d7c
                            • Opcode Fuzzy Hash: f51f281e95a2fd0eecc2552af4f4d266541640cfa32dd10eb26e21e27db96240
                            • Instruction Fuzzy Hash: BA21A631511666AFCB20AF38EC84A6677A4FB05724F158734FD25D31E2E7309C91DB84
                            APIs
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007F9802
                              • Part of subcall function 007A7D2C: _memmove.LIBCMT ref: 007A7D66
                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007F9834
                            • __itow.LIBCMT ref: 007F984C
                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007F9874
                            • __itow.LIBCMT ref: 007F9885
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$__itow$_memmove
                            • String ID:
                            • API String ID: 2983881199-0
                            • Opcode ID: 3d6933c8e2175b571ffac69dc3246792fe047924b1a3c932c67964b56c315c02
                            • Instruction ID: 3a28bfb77d8a5d1b58d66407893666e7001df1a3db8c00bb99ed6cdaec639c49
                            • Opcode Fuzzy Hash: 3d6933c8e2175b571ffac69dc3246792fe047924b1a3c932c67964b56c315c02
                            • Instruction Fuzzy Hash: A5218331B00208EBDB209A658C8AFFE7BA9EF8A750F044039FB05DB351E6788D45D791
                            APIs
                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A134D
                            • SelectObject.GDI32(?,00000000), ref: 007A135C
                            • BeginPath.GDI32(?), ref: 007A1373
                            • SelectObject.GDI32(?,00000000), ref: 007A139C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: 44e63dde3dcc9abe29bcf72d1fafcd922ef39d1dd5bc8b08e8a68d2b6dee32a7
                            • Instruction ID: 1021d417b061def015036a09054f302a05b7a8da33d76e7d1532be7d9045d7d3
                            • Opcode Fuzzy Hash: 44e63dde3dcc9abe29bcf72d1fafcd922ef39d1dd5bc8b08e8a68d2b6dee32a7
                            • Instruction Fuzzy Hash: CE213C70800248EBEF119F25DC04BAD7BB8FB81322F558336E910975A1E7B599A2DB90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: 5c766d870e61a057871cf525f96ce0ae1ccf1a6d2da53a58d0d5f52ca3c0a7a9
                            • Instruction ID: 820d7eade9afd8a67824abd14fd8e603c0e08476acf7ecdf062b1d485380e6da
                            • Opcode Fuzzy Hash: 5c766d870e61a057871cf525f96ce0ae1ccf1a6d2da53a58d0d5f52ca3c0a7a9
                            • Instruction Fuzzy Hash: 2A0196F160410D7BD205A6245E56F7B635CEB513A4F444029FE14E6383EA5CEE21C2E1
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00804D5C
                            • __beginthreadex.LIBCMT ref: 00804D7A
                            • MessageBoxW.USER32(?,?,?,?), ref: 00804D8F
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00804DA5
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00804DAC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                            • String ID:
                            • API String ID: 3824534824-0
                            • Opcode ID: f9ddf869fb397b9f32668bae1667dd127a81e2f808ce4e94984fd56cb9ae4520
                            • Instruction ID: f722b03f4d26a3de02c79c308367d3a9c6bdf68629c22fa4c2b90f96a40d2ab0
                            • Opcode Fuzzy Hash: f9ddf869fb397b9f32668bae1667dd127a81e2f808ce4e94984fd56cb9ae4520
                            • Instruction Fuzzy Hash: 371104B2904249BBC7119BA8DC08A9B7FADFB45324F188369FE14D3391D6B58D548BA0
                            APIs
                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F8766
                            • GetLastError.KERNEL32(?,007F822A,?,?,?), ref: 007F8770
                            • GetProcessHeap.KERNEL32(00000008,?,?,007F822A,?,?,?), ref: 007F877F
                            • HeapAlloc.KERNEL32(00000000,?,007F822A,?,?,?), ref: 007F8786
                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F879D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 842720411-0
                            • Opcode ID: 2549620789798512b70fcd0d1f50ce5cf76ccf26a5917987d8411e6e3da55dc7
                            • Instruction ID: a543a7dbcfc9b8ec45795424be8d38313ea1ee4e9e905bfa75454185e26e7df4
                            • Opcode Fuzzy Hash: 2549620789798512b70fcd0d1f50ce5cf76ccf26a5917987d8411e6e3da55dc7
                            • Instruction Fuzzy Hash: C7014BB1600208FFDB205FA6DC89D6B7BBCFF99755B204439FA49C6260DA318C12CA70
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00805502
                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00805510
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00805518
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00805522
                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0080555E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: PerformanceQuery$CounterSleep$Frequency
                            • String ID:
                            • API String ID: 2833360925-0
                            • Opcode ID: 72e86c4ee51dd4b991ca2ba64513adbd7dceef658b7a380ce09dbd3b3c56e4f4
                            • Instruction ID: 685ad620c68d8b7fad79d3f4ea16682e15beeec2af63489f8f30f9bd21f48b89
                            • Opcode Fuzzy Hash: 72e86c4ee51dd4b991ca2ba64513adbd7dceef658b7a380ce09dbd3b3c56e4f4
                            • Instruction Fuzzy Hash: B8013975C00A1DDBCF109BE8EC496EEBB78FB09711F404066E901F2191DB309661CBA1
                            APIs
                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?,?,?,007F799D), ref: 007F766F
                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?,?), ref: 007F768A
                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?,?), ref: 007F7698
                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?), ref: 007F76A8
                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007F758C,80070057,?,?), ref: 007F76B4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: From$Prog$FreeStringTasklstrcmpi
                            • String ID:
                            • API String ID: 3897988419-0
                            • Opcode ID: cb612f16a1bfb2dba0c5acf213c6eb566f96d34a3c9c6ad2b806ba5411ae1986
                            • Instruction ID: f28d4fb0537aa6ba47efcdf96d108b5aff0f2b4ae5bc89f88573be504d915d89
                            • Opcode Fuzzy Hash: cb612f16a1bfb2dba0c5acf213c6eb566f96d34a3c9c6ad2b806ba5411ae1986
                            • Instruction Fuzzy Hash: E0017172601608ABDB249F5CDC48AAABBBDEB49761F144038FE04D2312E735DD41D7A0
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F8608
                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F8612
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F8621
                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F8628
                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F863E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 487d3fd412b2dac378fe55f8cc15a703541add3e273991497786e719d9840990
                            • Instruction ID: 271c5305ff0455976a03f32496f8812da7c80811206ba0308e52d4f3b3eb5b87
                            • Opcode Fuzzy Hash: 487d3fd412b2dac378fe55f8cc15a703541add3e273991497786e719d9840990
                            • Instruction Fuzzy Hash: C2F03C31205208AFEB214FA5DC89E7B3BACFF89754B444435FA45C6252CB659C42DA61
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F8669
                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F8673
                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F8682
                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F8689
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F869F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 08dcac769bc765e9d8f3ec833bb377ef16b85b9efefb5b7e2cb612922df32140
                            • Instruction ID: 2ee3bc3ba0652879b0f0f9ea8109031d7c577e70c3248b0b952335ecea8ecc00
                            • Opcode Fuzzy Hash: 08dcac769bc765e9d8f3ec833bb377ef16b85b9efefb5b7e2cb612922df32140
                            • Instruction Fuzzy Hash: 15F04F71200208BFEB215FA5EC88E773BBCFF89754B104035FA45C6252CB759942DA61
                            APIs
                            • GetDlgItem.USER32(?,000003E9), ref: 007FC6BA
                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 007FC6D1
                            • MessageBeep.USER32(00000000), ref: 007FC6E9
                            • KillTimer.USER32(?,0000040A), ref: 007FC705
                            • EndDialog.USER32(?,00000001), ref: 007FC71F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                            • String ID:
                            • API String ID: 3741023627-0
                            • Opcode ID: 18554659602a47fd3674856aadf5212bd905070da9f0adb2f4b3d8b5aad0df3e
                            • Instruction ID: 2a785e420992395ce942c6015678a50324f996e6b6eecd0fe628cbadd9003989
                            • Opcode Fuzzy Hash: 18554659602a47fd3674856aadf5212bd905070da9f0adb2f4b3d8b5aad0df3e
                            • Instruction Fuzzy Hash: 0F014F3050470CABEB316B60DD4EFA677B8FF10705F004669B752A15E1EBE8A959CE90
                            APIs
                            • EndPath.GDI32(?), ref: 007A13BF
                            • StrokeAndFillPath.GDI32(?,?,007DBAD8,00000000,?), ref: 007A13DB
                            • SelectObject.GDI32(?,00000000), ref: 007A13EE
                            • DeleteObject.GDI32 ref: 007A1401
                            • StrokePath.GDI32(?), ref: 007A141C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Path$ObjectStroke$DeleteFillSelect
                            • String ID:
                            • API String ID: 2625713937-0
                            • Opcode ID: 6f5a5b426f2be4d99de3edc86d608c8762633994b6bb8398f10ac1fbf4c889cb
                            • Instruction ID: 4f5992135a77db5f0c52370203bbb95dc4dc865f9ee632b02665af1d7ad12a8a
                            • Opcode Fuzzy Hash: 6f5a5b426f2be4d99de3edc86d608c8762633994b6bb8398f10ac1fbf4c889cb
                            • Instruction Fuzzy Hash: E7F0C930004688EBEB225F2AED0CB583FB5B742326F55D234E929860F2D77949A6DF50
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 0080C69D
                            • CoCreateInstance.OLE32(00832D6C,00000000,00000001,00832BDC,?), ref: 0080C6B5
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                            • CoUninitialize.OLE32 ref: 0080C922
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_memmove
                            • String ID: .lnk
                            • API String ID: 2683427295-24824748
                            • Opcode ID: 44ba1bcf1f6b081d2922489d62735e0517f70d665eee676854d4a8603547effe
                            • Instruction ID: 5b3fc594f43502a0868f03ef97d406fb42a40cdd7f2278daa6ffcf383641fe99
                            • Opcode Fuzzy Hash: 44ba1bcf1f6b081d2922489d62735e0517f70d665eee676854d4a8603547effe
                            • Instruction Fuzzy Hash: 1BA11B71204205AFD700EF54C885EABB7E8FFD5704F008A29F256971A2EB75AA49CB52
                            APIs
                              • Part of subcall function 007C0FF6: std::exception::exception.LIBCMT ref: 007C102C
                              • Part of subcall function 007C0FF6: __CxxThrowException@8.LIBCMT ref: 007C1041
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 007A7BB1: _memmove.LIBCMT ref: 007A7C0B
                            • __swprintf.LIBCMT ref: 007B302D
                            Strings
                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 007B2EC6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                            • API String ID: 1943609520-557222456
                            • Opcode ID: db280dbf701c93e1b42ab8417159f44c570365976052a4b19c9c660513b4f312
                            • Instruction ID: 1bf7838bad70f42bb3fbedf1cdaf2f5e19cc4b8de6b1d8fbb0a22a8d4b5a63fa
                            • Opcode Fuzzy Hash: db280dbf701c93e1b42ab8417159f44c570365976052a4b19c9c660513b4f312
                            • Instruction Fuzzy Hash: 52916F71108341DFC718EF24D989DAEB7A5EF99750F004A1DF4459B2A1EA38EE44CBA2
                            APIs
                              • Part of subcall function 007A48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007A48A1,?,?,007A37C0,?), ref: 007A48CE
                            • CoInitialize.OLE32(00000000), ref: 0080BC26
                            • CoCreateInstance.OLE32(00832D6C,00000000,00000001,00832BDC,?), ref: 0080BC3F
                            • CoUninitialize.OLE32 ref: 0080BC5C
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                            • String ID: .lnk
                            • API String ID: 2126378814-24824748
                            • Opcode ID: c2f46b1a32f143fe6a8a8bc67bb4728f60e29ab196b3184e6bcc803585be4cb7
                            • Instruction ID: e7691714d89a8370eb37ae79f381bde7070ca90ef16d3063f76d493bf0fc4ae1
                            • Opcode Fuzzy Hash: c2f46b1a32f143fe6a8a8bc67bb4728f60e29ab196b3184e6bcc803585be4cb7
                            • Instruction Fuzzy Hash: 2CA143752043019FCB10DF14C888D6ABBE5FF89314F148A98F9999B3A1CB35ED45CB91
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 007C52DD
                              • Part of subcall function 007D0340: __87except.LIBCMT ref: 007D037B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorHandling__87except__start
                            • String ID: pow
                            • API String ID: 2905807303-2276729525
                            • Opcode ID: f352b5c98f49eee225cd2fcf71594e06db68cfa161a30863bb09a64b6970b6df
                            • Instruction ID: 61cf69690d0873114eb2a2d7a051f039048bcb79453136dc2d6ace327fcb97fb
                            • Opcode Fuzzy Hash: f352b5c98f49eee225cd2fcf71594e06db68cfa161a30863bb09a64b6970b6df
                            • Instruction Fuzzy Hash: E45178A1A0CA41C7DB11B724C901B6E2BE0AB41350F246D5EE4C5823E6EF7EDCD49AC6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID: #$+
                            • API String ID: 0-2552117581
                            • Opcode ID: 550aeb6d7dc1978460e5a5a15201b453451de3fb56a33e141728bbbae0dc5fa5
                            • Instruction ID: af8bfc7d332650990089ceaa5ca6ba01a6849da5e30975549cc69c843ac735e0
                            • Opcode Fuzzy Hash: 550aeb6d7dc1978460e5a5a15201b453451de3fb56a33e141728bbbae0dc5fa5
                            • Instruction Fuzzy Hash: FF511275606689DFCF259F28C888AF97BA4FF56310F184059EA919B3A0D73C9C42C7A0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove$_free
                            • String ID: Oa{
                            • API String ID: 2620147621-1068949949
                            • Opcode ID: 192167d86d9f67e55740e047c077e9b34491011ea00d45a62fda5bfe337a92fb
                            • Instruction ID: ad5aefba1122b1dd8fb3bd6365fd5a2cb6b93dc0b391c80737221c41bfded7ff
                            • Opcode Fuzzy Hash: 192167d86d9f67e55740e047c077e9b34491011ea00d45a62fda5bfe337a92fb
                            • Instruction Fuzzy Hash: F2515A716083419FDB24CF28C485B6EBBE5BF89314F04492DE989C7351EB39E981CB92
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memset$_memmove
                            • String ID: ERCP
                            • API String ID: 2532777613-1384759551
                            • Opcode ID: 62e1788313bc821bf566ff615242b64f710e792497ee3c6b104414cfdcb7517d
                            • Instruction ID: b582e6ae60d9680e1b9116b2638360bf288ce7284e363243247518c83a832201
                            • Opcode Fuzzy Hash: 62e1788313bc821bf566ff615242b64f710e792497ee3c6b104414cfdcb7517d
                            • Instruction Fuzzy Hash: 62516D71900759DBDB24CF65C885BEABBE4FF04714F20856EEA4ACB241E7799684CB40
                            APIs
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0082F910,00000000,?,?,?,?), ref: 00827C4E
                            • GetWindowLongW.USER32 ref: 00827C6B
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00827C7B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID: SysTreeView32
                            • API String ID: 847901565-1698111956
                            • Opcode ID: 5475bc60395e010dd04b8f3b7c497520acad5659d4f4297e1e67105ff9712cea
                            • Instruction ID: 9b4151deb34514c60f2ef65e172f175a00f150aa40f54f66a8b65ccda282d0eb
                            • Opcode Fuzzy Hash: 5475bc60395e010dd04b8f3b7c497520acad5659d4f4297e1e67105ff9712cea
                            • Instruction Fuzzy Hash: 3E31FC31204216ABDB218F38EC05BEA37A9FF59324F204725F975E32E0C734E8918B50
                            APIs
                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 008276D0
                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 008276E4
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00827708
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$Window
                            • String ID: SysMonthCal32
                            • API String ID: 2326795674-1439706946
                            • Opcode ID: 7e552709f42077957a56d061f86395fbbf92ed033e134c4a5b820e583b7b4a31
                            • Instruction ID: 373b856f49382a2d0c562aa4ede7fcbe7094f4fa8241237410f0f6e7f945eb1b
                            • Opcode Fuzzy Hash: 7e552709f42077957a56d061f86395fbbf92ed033e134c4a5b820e583b7b4a31
                            • Instruction Fuzzy Hash: D621BF32600229BBDF258E64DC46FEA3B79FB58714F110214FE15AB1D0D6B1A891CBA0
                            APIs
                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00826FAA
                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00826FBA
                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00826FDF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend$MoveWindow
                            • String ID: Listbox
                            • API String ID: 3315199576-2633736733
                            • Opcode ID: 9ef7e29c0d793b9b782826c0073343346687a8f3833d7fd6b58d387f0290c513
                            • Instruction ID: 35f630dcdf0fa684dd74e6cc3e39f833c70e626ff4dbe4bd46f14f516d46834f
                            • Opcode Fuzzy Hash: 9ef7e29c0d793b9b782826c0073343346687a8f3833d7fd6b58d387f0290c513
                            • Instruction Fuzzy Hash: 10219532611128BFDF158F54EC85EAB37AAFF89754F018124FA14D7190DA719CA1C7A0
                            APIs
                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 008279E1
                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 008279F6
                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00827A03
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: msctls_trackbar32
                            • API String ID: 3850602802-1010561917
                            • Opcode ID: 6e83b2b4e3600c2a822cd7543f3312b6b434b61499bbc3fd603c34d111e04104
                            • Instruction ID: e91bc9ec4989bc039988a5b07bf517df642dde861a206c0abaefbde9f0418dc7
                            • Opcode Fuzzy Hash: 6e83b2b4e3600c2a822cd7543f3312b6b434b61499bbc3fd603c34d111e04104
                            • Instruction Fuzzy Hash: 7D11E332244218BBEF249F75DC05FAB3BA9FF89764F024629FA41A6091D2719891CB60
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,007A4C2E), ref: 007A4CA3
                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 007A4CB5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetNativeSystemInfo$kernel32.dll
                            • API String ID: 2574300362-192647395
                            • Opcode ID: 33b2c56891e2308dbb5be4c2f86e9cfa1efec83d6b7076a3c5a1c3c13308c3b6
                            • Instruction ID: 597d53af567886ea4d48403cf7b8356f91022bfb11db8c7a5c34f834b34bb6dd
                            • Opcode Fuzzy Hash: 33b2c56891e2308dbb5be4c2f86e9cfa1efec83d6b7076a3c5a1c3c13308c3b6
                            • Instruction Fuzzy Hash: 78D01730510723CFD7209F31EA1860676F5BF46BA1B11C83EA99AD6251E6B8D8C1CA60
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,007A4D2E,?,007A4F4F,?,008662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 007A4D6F
                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007A4D81
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                            • API String ID: 2574300362-3689287502
                            • Opcode ID: d89e7aceb23f3f6d6918e685cb231f7de5dee1e25de64a23fe24e6c27eb5a874
                            • Instruction ID: b340835a8bb791c72a5e2392745f17d8a857dca25eb81e8825971d0bf0b385e5
                            • Opcode Fuzzy Hash: d89e7aceb23f3f6d6918e685cb231f7de5dee1e25de64a23fe24e6c27eb5a874
                            • Instruction Fuzzy Hash: 83D01730610723CFD7319F31E80861676E8BF56762B51C93AAA96DA290E6B9D880CA50
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,007A4CE1,?), ref: 007A4DA2
                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007A4DB4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                            • API String ID: 2574300362-1355242751
                            • Opcode ID: 8366fc3017c4ac54f63d2e56ccd8274f8df418b55fb78f5881a81a258d5a0512
                            • Instruction ID: 4a0ca99ac789161cf4591b9e7a12cf859656f806fc69019650d5ef6c4b3f157e
                            • Opcode Fuzzy Hash: 8366fc3017c4ac54f63d2e56ccd8274f8df418b55fb78f5881a81a258d5a0512
                            • Instruction Fuzzy Hash: 50D01231650713DFD7305F31D80864676E4FF45755B11C839D9D6D6250D7B8D481C650
                            APIs
                            • LoadLibraryA.KERNEL32(advapi32.dll,?,008212C1), ref: 00821080
                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00821092
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 2574300362-4033151799
                            • Opcode ID: ebff379fdbb3f57565cc64b8d1734cc8607f1e6ef29108f7284a4f07d579a928
                            • Instruction ID: 2ade85a0e1ef144c84db680f65eff10a445abbe626f5299abc731caca19c7d8c
                            • Opcode Fuzzy Hash: ebff379fdbb3f57565cc64b8d1734cc8607f1e6ef29108f7284a4f07d579a928
                            • Instruction Fuzzy Hash: 3AD01230510722CFDB305F75D81852676F4FF25752F11CC39A895D6650D774C4C0C650
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00819009,?,0082F910), ref: 00819403
                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00819415
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetModuleHandleExW$kernel32.dll
                            • API String ID: 2574300362-199464113
                            • Opcode ID: 9b475176a2ce4fe1154f6cb1cf0377169578b7469f6f4adc82fcc097c7b1fed4
                            • Instruction ID: 955c54ecf8c69a08d910bec437e685dfadcebf59c2a7d5b97366478263c7f3b1
                            • Opcode Fuzzy Hash: 9b475176a2ce4fe1154f6cb1cf0377169578b7469f6f4adc82fcc097c7b1fed4
                            • Instruction Fuzzy Hash: ABD0C730500323CFC7308F30DA0824376E8FF08352B00C83AE9D2C2651E674E8C0CA10
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: LocalTime__swprintf
                            • String ID: %.3d$WIN_XPe
                            • API String ID: 2070861257-2409531811
                            • Opcode ID: 6dfda8cb4b7f9bd419b0fb2e4d748bf0a610f19aeca18561e59aaf0d13bc2d18
                            • Instruction ID: bb2eb61b7f011795eea6a00fa61486f34b8b32877e6229c079c3d3c22389d340
                            • Opcode Fuzzy Hash: 6dfda8cb4b7f9bd419b0fb2e4d748bf0a610f19aeca18561e59aaf0d13bc2d18
                            • Instruction Fuzzy Hash: 3AD012F5805159EACB599A918C46DFA737CF70C301F9046D2B902D1000F33C9B85DB25
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 50aacb962402a2ebd28b9874a6a02dbd2b19bfa2d61515584458efaf829796f6
                            • Instruction ID: fba7a3dfa5917ca83ee6590d6d816ea7240c529513712ad346006fbfdf0bd3d2
                            • Opcode Fuzzy Hash: 50aacb962402a2ebd28b9874a6a02dbd2b19bfa2d61515584458efaf829796f6
                            • Instruction Fuzzy Hash: F8C15C74A0421AEFCB18DFA8C884ABEB7B5FF48710B118598E905EB351D774ED81DB90
                            APIs
                            • CharLowerBuffW.USER32(?,?), ref: 0081E3D2
                            • CharLowerBuffW.USER32(?,?), ref: 0081E415
                              • Part of subcall function 0081DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0081DAD9
                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0081E615
                            • _memmove.LIBCMT ref: 0081E628
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: BuffCharLower$AllocVirtual_memmove
                            • String ID:
                            • API String ID: 3659485706-0
                            • Opcode ID: 28a7bc80c2aa01d0abf19e6345495fd8dbfa1052867cd59775419e06970240a2
                            • Instruction ID: 192e8088da97c4efa070227583a90ea3222a2b8dda76e2f04e2c3f5d06a71b6e
                            • Opcode Fuzzy Hash: 28a7bc80c2aa01d0abf19e6345495fd8dbfa1052867cd59775419e06970240a2
                            • Instruction Fuzzy Hash: B9C125716083019FC714DF28C48099ABBE9FF89718F14896DF999DB351D734E986CB82
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 008183D8
                            • CoUninitialize.OLE32 ref: 008183E3
                              • Part of subcall function 007FDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007FDAC5
                            • VariantInit.OLEAUT32(?), ref: 008183EE
                            • VariantClear.OLEAUT32(?), ref: 008186BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                            • String ID:
                            • API String ID: 780911581-0
                            • Opcode ID: af9b3de290f2360d764eb2c16993c2befaa66aa5d54b6adc2f21ab5174cfd6a3
                            • Instruction ID: 01d96ca5a138bbd864965bc80170ea885ff2caa63f69537d9c3f88e8e0569bfa
                            • Opcode Fuzzy Hash: af9b3de290f2360d764eb2c16993c2befaa66aa5d54b6adc2f21ab5174cfd6a3
                            • Instruction Fuzzy Hash: 3CA14775204701DFCB10DF24C48AA5AB7E9FF89314F048559FA9A9B3A1CB34ED50CB86
                            APIs
                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00832C7C,?), ref: 007F7C32
                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00832C7C,?), ref: 007F7C4A
                            • CLSIDFromProgID.OLE32(?,?,00000000,0082FB80,000000FF,?,00000000,00000800,00000000,?,00832C7C,?), ref: 007F7C6F
                            • _memcmp.LIBCMT ref: 007F7C90
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FromProg$FreeTask_memcmp
                            • String ID:
                            • API String ID: 314563124-0
                            • Opcode ID: 87c8e2ea1cf4fc3945b12e2c0e8199bc23d7181b8b9b132f87fa287dd95ac58f
                            • Instruction ID: 7ac8a54ce0403264d4896a65d64bcafb0f482abb1b41e1663dffe49ee51f92f5
                            • Opcode Fuzzy Hash: 87c8e2ea1cf4fc3945b12e2c0e8199bc23d7181b8b9b132f87fa287dd95ac58f
                            • Instruction Fuzzy Hash: E2810C71A00109EFCB04DF94C988DEEB7B9FF89315F2045A8E615AB250DB75AE06CB60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Variant$AllocClearCopyInitString
                            • String ID:
                            • API String ID: 2808897238-0
                            • Opcode ID: 290efc21478b45a68c254747b4981c516580345b1b1f6531afa72bf78724a27a
                            • Instruction ID: d9b2ff3abdadcb1f85dd28107ecc6e871bb26eb553b87fbcd10e1b46592c78c4
                            • Opcode Fuzzy Hash: 290efc21478b45a68c254747b4981c516580345b1b1f6531afa72bf78724a27a
                            • Instruction Fuzzy Hash: 9351BB35604309DADB34AF65D895A3EB3E5AF45320F20882FE756CB391EF789880DB15
                            APIs
                            • GetWindowRect.USER32(00F2E3E0,?), ref: 00829AD2
                            • ScreenToClient.USER32(00000002,00000002), ref: 00829B05
                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00829B72
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$ClientMoveRectScreen
                            • String ID:
                            • API String ID: 3880355969-0
                            • Opcode ID: 42f6958bc300eeac8c4d808f0029370429e9a7ece80ed147e39a2982a1c08c95
                            • Instruction ID: ace1cf75b0d231e427bc1d0d9aec3ee34e059306ccd02a20a757dd44ea51c566
                            • Opcode Fuzzy Hash: 42f6958bc300eeac8c4d808f0029370429e9a7ece80ed147e39a2982a1c08c95
                            • Instruction Fuzzy Hash: 47515334A00269EFCF10CF68E8819AE7BB5FF55320F108269F955DB290D730AD91CB90
                            APIs
                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00816CE4
                            • WSAGetLastError.WSOCK32(00000000), ref: 00816CF4
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00816D58
                            • WSAGetLastError.WSOCK32(00000000), ref: 00816D64
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ErrorLast$__itow__swprintfsocket
                            • String ID:
                            • API String ID: 2214342067-0
                            • Opcode ID: 2059c75feb56f274d71945711245351d42e6ff0c89ade9ea0e764b57d51b2522
                            • Instruction ID: 23a7c8b563f76dfdfbb014dc18cc1feac7a79e4fba99b20ecb192b333f4bf355
                            • Opcode Fuzzy Hash: 2059c75feb56f274d71945711245351d42e6ff0c89ade9ea0e764b57d51b2522
                            • Instruction Fuzzy Hash: D3418174740200EFEB20AF24DC8AF7A76A9EF85B14F44C118FA599B2D2DA759C118791
                            APIs
                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0082F910), ref: 008167BA
                            • _strlen.LIBCMT ref: 008167EC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _strlen
                            • String ID:
                            • API String ID: 4218353326-0
                            • Opcode ID: bcdb6a30cee08e8d2d651a7ce48754c6f5e47e7cf2871bb4da2353225de8c704
                            • Instruction ID: c5b30d3dddbafdfb249b9a2866936f1d72afee729f35e4e8c7151db3ab6661b8
                            • Opcode Fuzzy Hash: bcdb6a30cee08e8d2d651a7ce48754c6f5e47e7cf2871bb4da2353225de8c704
                            • Instruction Fuzzy Hash: 86416F71A00104EBCB14EB64DCC9EEEB7ADFF45314F148269F91997292EB34AD90C751
                            APIs
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0080BB09
                            • GetLastError.KERNEL32(?,00000000), ref: 0080BB2F
                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0080BB54
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0080BB80
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CreateHardLink$DeleteErrorFileLast
                            • String ID:
                            • API String ID: 3321077145-0
                            • Opcode ID: 878499c6e8c80402fd9656487f40b1c072db70258dec4c6d5d5be16c65f92116
                            • Instruction ID: 78e3a5e45cc02f5f61041b802e89b3cfc21a913cfa4f078525f3c5127e89a4e3
                            • Opcode Fuzzy Hash: 878499c6e8c80402fd9656487f40b1c072db70258dec4c6d5d5be16c65f92116
                            • Instruction Fuzzy Hash: 6741F939200610DFCB21DF15C589A5ABBE5FF8A320B198499FD4A9B762CB34FD11CB91
                            APIs
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00828B4D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: InvalidateRect
                            • String ID:
                            • API String ID: 634782764-0
                            • Opcode ID: 6eb4022161017916b557871e77791a72cdc571811e0e86dd95fdc4f2681a84fc
                            • Instruction ID: 02f8786a664b01ed4176f9cc3c9057e6d7955bb0585cdda580e147f771013ba1
                            • Opcode Fuzzy Hash: 6eb4022161017916b557871e77791a72cdc571811e0e86dd95fdc4f2681a84fc
                            • Instruction Fuzzy Hash: 0D31D674602228FFEF209E18EC45FA93765FB09334F54852AFA51D72A1DE3099D0DA41
                            APIs
                            • ClientToScreen.USER32(?,?), ref: 0082AE1A
                            • GetWindowRect.USER32(?,?), ref: 0082AE90
                            • PtInRect.USER32(?,?,0082C304), ref: 0082AEA0
                            • MessageBeep.USER32(00000000), ref: 0082AF11
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Rect$BeepClientMessageScreenWindow
                            • String ID:
                            • API String ID: 1352109105-0
                            • Opcode ID: b87c8446894465bc2b78ac6dce8be5d98aa5272794afbea474303b27559c3a2c
                            • Instruction ID: 033260569dfa12a953afaa8e37ec4039df27cc3253f0b4b5f0b619d40e5c328d
                            • Opcode Fuzzy Hash: b87c8446894465bc2b78ac6dce8be5d98aa5272794afbea474303b27559c3a2c
                            • Instruction Fuzzy Hash: DF419174600229DFCB15CF68E884B69BBF5FF88350F1681B9E514DB255D731A882CF92
                            APIs
                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00801037
                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00801053
                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 008010B9
                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 0080110B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: efe1195c14cbcba8c3b179ce1e80c3f5ec3610651035fcf9247dca0fc0e4cb76
                            • Instruction ID: 30472cafec6946bc1895c0ad8f5f0a420993983e5b45d1948c9a93cbb62f9267
                            • Opcode Fuzzy Hash: efe1195c14cbcba8c3b179ce1e80c3f5ec3610651035fcf9247dca0fc0e4cb76
                            • Instruction Fuzzy Hash: 50311630A40A88AEFF748B698C0DBF9BBA9FB45330F44422AE5C0D21D1C77549C19B56
                            APIs
                            • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00801176
                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00801192
                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 008011F1
                            • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00801243
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: a72ade4276b3cd674e6f674dabadc72b7bdc8d900a357af7115b43119268f478
                            • Instruction ID: a1ac5a97c7a6a0395022eda9a3c4bdc0fbd724f60f4ee8299adf796e83771421
                            • Opcode Fuzzy Hash: a72ade4276b3cd674e6f674dabadc72b7bdc8d900a357af7115b43119268f478
                            • Instruction Fuzzy Hash: F6310730A4060C5EEF78CA698C0D7FABBBAFB49334F04531BE680D21D1C33449959755
                            APIs
                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 007D644B
                            • __isleadbyte_l.LIBCMT ref: 007D6479
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007D64A7
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007D64DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                            • String ID:
                            • API String ID: 3058430110-0
                            • Opcode ID: 71ee5b12fcaf2ca71b80ac9c082e39d999c2e91e0afbebe957275124c2ae7afa
                            • Instruction ID: a68af4d8ca543010c7ffddf3949bec8edfb61b00ab6445b0317d01b40352fd74
                            • Opcode Fuzzy Hash: 71ee5b12fcaf2ca71b80ac9c082e39d999c2e91e0afbebe957275124c2ae7afa
                            • Instruction Fuzzy Hash: AD31CF31600286EFDB218F65C845BAA7BB5FF40350F15842AE855872A1EB39DA91DB90
                            APIs
                            • GetForegroundWindow.USER32 ref: 00825189
                              • Part of subcall function 0080387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00803897
                              • Part of subcall function 0080387D: GetCurrentThreadId.KERNEL32 ref: 0080389E
                              • Part of subcall function 0080387D: AttachThreadInput.USER32(00000000,?,008052A7), ref: 008038A5
                            • GetCaretPos.USER32(?), ref: 0082519A
                            • ClientToScreen.USER32(00000000,?), ref: 008251D5
                            • GetForegroundWindow.USER32 ref: 008251DB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                            • String ID:
                            • API String ID: 2759813231-0
                            • Opcode ID: 4351d4923a61ea881f1553d178f1ce9d830d0c9b969eb19051129bd212e68048
                            • Instruction ID: 42b652128cb069b2ea03f1da8ee39af01871b3f9fbaa950e8951ba2ca604ad0b
                            • Opcode Fuzzy Hash: 4351d4923a61ea881f1553d178f1ce9d830d0c9b969eb19051129bd212e68048
                            • Instruction Fuzzy Hash: F8313E71A00108AFDB10EFA5CC859EFB7FDEF99300F10806AE515E7251EA759E45CBA1
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • GetCursorPos.USER32(?), ref: 0082C7C2
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007DBBFB,?,?,?,?,?), ref: 0082C7D7
                            • GetCursorPos.USER32(?), ref: 0082C824
                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007DBBFB,?,?,?), ref: 0082C85E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                            • String ID:
                            • API String ID: 2864067406-0
                            • Opcode ID: 6b6fb1d6e704fe2c8dd365095a514ee716ba1bf6f8fd49dd7c3dee2093f9491b
                            • Instruction ID: ac12db7a3a6c869019f470e9e404aa4a327b31f9fb8d5c22a0572f3670ce6963
                            • Opcode Fuzzy Hash: 6b6fb1d6e704fe2c8dd365095a514ee716ba1bf6f8fd49dd7c3dee2093f9491b
                            • Instruction Fuzzy Hash: 74316F35600028AFCB25CF58D898EFE7BBAFB49310F048179F905CB261D73599A1DBA0
                            APIs
                            • __setmode.LIBCMT ref: 007C0BF2
                              • Part of subcall function 007A5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00807B20,?,?,00000000), ref: 007A5B8C
                              • Part of subcall function 007A5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00807B20,?,?,00000000,?,?), ref: 007A5BB0
                            • _fprintf.LIBCMT ref: 007C0C29
                            • OutputDebugStringW.KERNEL32(?), ref: 007F6331
                              • Part of subcall function 007C4CDA: _flsall.LIBCMT ref: 007C4CF3
                            • __setmode.LIBCMT ref: 007C0C5E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                            • String ID:
                            • API String ID: 521402451-0
                            • Opcode ID: c99fd9c2053b01c3d84aa3fa58f5b991c0903c976f26e52c8becc5ea14156978
                            • Instruction ID: bf591c3d5f3945044a3088a4246d3f61fb65ca0db1afb5f3ba5474d57cb32c05
                            • Opcode Fuzzy Hash: c99fd9c2053b01c3d84aa3fa58f5b991c0903c976f26e52c8becc5ea14156978
                            • Instruction Fuzzy Hash: 8811E731904208FACB14B7B49C4AEFE7B6DEF82320F14421DF204971D2DE695D9697E5
                            APIs
                              • Part of subcall function 007F8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F8669
                              • Part of subcall function 007F8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F8673
                              • Part of subcall function 007F8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F8682
                              • Part of subcall function 007F8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F8689
                              • Part of subcall function 007F8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F869F
                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007F8BEB
                            • _memcmp.LIBCMT ref: 007F8C0E
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F8C44
                            • HeapFree.KERNEL32(00000000), ref: 007F8C4B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                            • String ID:
                            • API String ID: 1592001646-0
                            • Opcode ID: 6f04e1533ec2b9ce1f2e92c7d5bf005ecfbd05a2d0de99487b53fd13401cd70c
                            • Instruction ID: 90e96cf817dd237c7a8074d7f1a97b72431742b6f20b6654f30c53d8f3dcb89b
                            • Opcode Fuzzy Hash: 6f04e1533ec2b9ce1f2e92c7d5bf005ecfbd05a2d0de99487b53fd13401cd70c
                            • Instruction Fuzzy Hash: AB218D71D0120CEBCB10CF94C945BBEB7B8EF40354F1440A9E654A7241DB34AA06DB61
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00811A97
                              • Part of subcall function 00811B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00811B40
                              • Part of subcall function 00811B21: InternetCloseHandle.WININET(00000000), ref: 00811BDD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Internet$CloseConnectHandleOpen
                            • String ID:
                            • API String ID: 1463438336-0
                            • Opcode ID: 935ba4c58cc9c33e8bd84add98f68dcb7f656dace24f971baacb19b24494a71d
                            • Instruction ID: 75b8eb7ca35a81e3b62ca3d1d90a42de482c5f09eddb2f62dc802170e1ffa445
                            • Opcode Fuzzy Hash: 935ba4c58cc9c33e8bd84add98f68dcb7f656dace24f971baacb19b24494a71d
                            • Instruction Fuzzy Hash: 2D21AC35204604BFDB219F608C09FFABBBDFF48B10F10402AFA41D6651EB31A861DBA0
                            APIs
                              • Part of subcall function 007FF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,007FE1C4,?,?,?,007FEFB7,00000000,000000EF,00000119,?,?), ref: 007FF5BC
                              • Part of subcall function 007FF5AD: lstrcpyW.KERNEL32(00000000,?), ref: 007FF5E2
                              • Part of subcall function 007FF5AD: lstrcmpiW.KERNEL32(00000000,?,007FE1C4,?,?,?,007FEFB7,00000000,000000EF,00000119,?,?), ref: 007FF613
                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,007FEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 007FE1DD
                            • lstrcpyW.KERNEL32(00000000,?), ref: 007FE203
                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,007FEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 007FE237
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: lstrcmpilstrcpylstrlen
                            • String ID: cdecl
                            • API String ID: 4031866154-3896280584
                            • Opcode ID: 3266196eefcd2ec492febe1552c133fffcc025b72b36b5595a4fb93758870b9e
                            • Instruction ID: 14241d366d2c944de5ba89d6518255314f21f8fcb2b5e810c8a7cc1e617f6395
                            • Opcode Fuzzy Hash: 3266196eefcd2ec492febe1552c133fffcc025b72b36b5595a4fb93758870b9e
                            • Instruction Fuzzy Hash: 55117F36200349EFCB25AF64D849E7A77B8FF85350B40802AEA16CB260FB759851D7A0
                            APIs
                            • _free.LIBCMT ref: 007D5351
                              • Part of subcall function 007C594C: __FF_MSGBANNER.LIBCMT ref: 007C5963
                              • Part of subcall function 007C594C: __NMSG_WRITE.LIBCMT ref: 007C596A
                              • Part of subcall function 007C594C: RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,007C1013,?), ref: 007C598F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: AllocateHeap_free
                            • String ID:
                            • API String ID: 614378929-0
                            • Opcode ID: 843296ed7c3ce7c85f606d236a7e4187847b517dc14221006359c9f53cde1a8b
                            • Instruction ID: d242e9b3d73db81710979706b3b884eec1ebd091a97cf0d1fbc8f2fd94cb5095
                            • Opcode Fuzzy Hash: 843296ed7c3ce7c85f606d236a7e4187847b517dc14221006359c9f53cde1a8b
                            • Instruction Fuzzy Hash: 9111C132504A15EFCB312F70AC08B5D3BB8AF147E4F20452FF9059A291DFBD89418790
                            APIs
                            • _memset.LIBCMT ref: 007A4560
                              • Part of subcall function 007A410D: _memset.LIBCMT ref: 007A418D
                              • Part of subcall function 007A410D: _wcscpy.LIBCMT ref: 007A41E1
                              • Part of subcall function 007A410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007A41F1
                            • KillTimer.USER32(?,00000001,?,?), ref: 007A45B5
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007A45C4
                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007DD6CE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                            • String ID:
                            • API String ID: 1378193009-0
                            • Opcode ID: ced546dfc9e574750fcaa7587197f6b67b1aca59e8173464d5ceefed78cd3b2d
                            • Instruction ID: 1b187b24cdcd875dc1b17c46e14a1b9f8bcc6d6390541afafe13a9c851371be2
                            • Opcode Fuzzy Hash: ced546dfc9e574750fcaa7587197f6b67b1aca59e8173464d5ceefed78cd3b2d
                            • Instruction Fuzzy Hash: 1E21DA70904784AFEB328B24D855BE7BFFCAF41304F04009EE69D56241D7B95E85CB91
                            APIs
                              • Part of subcall function 007A5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00807B20,?,?,00000000), ref: 007A5B8C
                              • Part of subcall function 007A5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00807B20,?,?,00000000,?,?), ref: 007A5BB0
                            • gethostbyname.WSOCK32(?,?,?), ref: 008166AC
                            • WSAGetLastError.WSOCK32(00000000), ref: 008166B7
                            • _memmove.LIBCMT ref: 008166E4
                            • inet_ntoa.WSOCK32(?), ref: 008166EF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                            • String ID:
                            • API String ID: 1504782959-0
                            • Opcode ID: f27b06cbc584894c64ebb4cd36030ded5462b1075e923c020b10fa45d9bbe0f9
                            • Instruction ID: cd415bbf08da9ded1d3ea2006a6c0cdfe5664561e957cbc15b66fa59dd7955e9
                            • Opcode Fuzzy Hash: f27b06cbc584894c64ebb4cd36030ded5462b1075e923c020b10fa45d9bbe0f9
                            • Instruction Fuzzy Hash: 84114F75500509EBCB00EBA4D98ADEEB7B8FF55310B148175F602A7262EB34AE54CB61
                            APIs
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 007F9043
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F9055
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F906B
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F9086
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 09e542923b0b1b05b2058f5c1a724aba4013c2e04f87586cf2b853bf7d8cfd80
                            • Instruction ID: 2e5070b8d535424a9c18d0aa04fce850cdb6080ba4cef7dca9fc136cc5a0b292
                            • Opcode Fuzzy Hash: 09e542923b0b1b05b2058f5c1a724aba4013c2e04f87586cf2b853bf7d8cfd80
                            • Instruction Fuzzy Hash: 2A114C79900219FFDB10DFA5C884FADBB74FB48310F2040A5EA04B7250DA726E10DB90
                            APIs
                              • Part of subcall function 007A2612: GetWindowLongW.USER32(?,000000EB), ref: 007A2623
                            • DefDlgProcW.USER32(?,00000020,?), ref: 007A12D8
                            • GetClientRect.USER32(?,?), ref: 007DB84B
                            • GetCursorPos.USER32(?), ref: 007DB855
                            • ScreenToClient.USER32(?,?), ref: 007DB860
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Client$CursorLongProcRectScreenWindow
                            • String ID:
                            • API String ID: 4127811313-0
                            • Opcode ID: 11f6105afe4d084920f70b5d55d165086e71cafaee8deadc791d4c62e3566ea5
                            • Instruction ID: 8d4105b022faabbf8ac436f8632ec66895e96909a797678abdc33c37f6025a57
                            • Opcode Fuzzy Hash: 11f6105afe4d084920f70b5d55d165086e71cafaee8deadc791d4c62e3566ea5
                            • Instruction Fuzzy Hash: C8115B35600019EFDB10DF98D989AEE77B8FB46300F404565FA01E3181C734AA52CBA5
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,008001FD,?,00801250,?,00008000), ref: 0080166F
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,008001FD,?,00801250,?,00008000), ref: 00801694
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,008001FD,?,00801250,?,00008000), ref: 0080169E
                            • Sleep.KERNEL32(?,?,?,?,?,?,?,008001FD,?,00801250,?,00008000), ref: 008016D1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CounterPerformanceQuerySleep
                            • String ID:
                            • API String ID: 2875609808-0
                            • Opcode ID: fe2b41e89dfbfb9a397484f15590dff6887f60963f769c08996193d488db79ec
                            • Instruction ID: 4dbb27b390e97fffdf9ae6500356e0db133d514023762c57bb7bfb40569271de
                            • Opcode Fuzzy Hash: fe2b41e89dfbfb9a397484f15590dff6887f60963f769c08996193d488db79ec
                            • Instruction Fuzzy Hash: 14115731C0552DEBCF009FA5DC48AEEBB78FF29721F448069EA50F2280CB319561CB96
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                            • String ID:
                            • API String ID: 3016257755-0
                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                            • Instruction ID: aac2b5a614f4b2f6150edf416ddb07edddefb0af14f2290379c4e365ea749879
                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                            • Instruction Fuzzy Hash: 5401433604418AFBCF1A5E84CC458EE3F72BF59351B588516FA1858231E23BD971EB81
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 0082B59E
                            • ScreenToClient.USER32(?,?), ref: 0082B5B6
                            • ScreenToClient.USER32(?,?), ref: 0082B5DA
                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0082B5F5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClientRectScreen$InvalidateWindow
                            • String ID:
                            • API String ID: 357397906-0
                            • Opcode ID: 4d666b745877e48ee326f8456eb2aa3b7439322e48a17710152ab047a45c6b20
                            • Instruction ID: 87947145c617110bba01c26a7a36d5426c00a928c53160e3add6e0eed8c688e6
                            • Opcode Fuzzy Hash: 4d666b745877e48ee326f8456eb2aa3b7439322e48a17710152ab047a45c6b20
                            • Instruction Fuzzy Hash: 6A1143B9D00209EFDB51CFA9D9849EEFBB9FB18310F108166E914E3620D735AA55CF90
                            APIs
                            • _memset.LIBCMT ref: 0082B8FE
                            • _memset.LIBCMT ref: 0082B90D
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00867F20,00867F64), ref: 0082B93C
                            • CloseHandle.KERNEL32 ref: 0082B94E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memset$CloseCreateHandleProcess
                            • String ID:
                            • API String ID: 3277943733-0
                            • Opcode ID: edb747743b8d1c9c18766007e40f38e869bcf43d344b4ec208d8e4791361fbcf
                            • Instruction ID: 7b096132d11e6cd7928c61210e3e370a9d9420eff865808e2e42cc49b418dcd6
                            • Opcode Fuzzy Hash: edb747743b8d1c9c18766007e40f38e869bcf43d344b4ec208d8e4791361fbcf
                            • Instruction Fuzzy Hash: 88F05EB2554310BBF21067A1AC1AFBB3B5CFB09358F015034FB08E5292DBB6490087E8
                            APIs
                            • EnterCriticalSection.KERNEL32(?), ref: 00806E88
                              • Part of subcall function 0080794E: _memset.LIBCMT ref: 00807983
                            • _memmove.LIBCMT ref: 00806EAB
                            • _memset.LIBCMT ref: 00806EB8
                            • LeaveCriticalSection.KERNEL32(?), ref: 00806EC8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CriticalSection_memset$EnterLeave_memmove
                            • String ID:
                            • API String ID: 48991266-0
                            • Opcode ID: df79d3ade17527f548f097000412526d307f8259210e6da4231c2bb51f7fc6f3
                            • Instruction ID: 41ff33b993dae3d16dc8a1fd3592249d3ed60603886410bf3a0c28dd705c0997
                            • Opcode Fuzzy Hash: df79d3ade17527f548f097000412526d307f8259210e6da4231c2bb51f7fc6f3
                            • Instruction Fuzzy Hash: 54F0303A100200EBCF516F55DC85E89BB2AFF45321B04C065FE089E25BC735A951CBB5
                            APIs
                              • Part of subcall function 007A12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A134D
                              • Part of subcall function 007A12F3: SelectObject.GDI32(?,00000000), ref: 007A135C
                              • Part of subcall function 007A12F3: BeginPath.GDI32(?), ref: 007A1373
                              • Part of subcall function 007A12F3: SelectObject.GDI32(?,00000000), ref: 007A139C
                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0082C030
                            • LineTo.GDI32(00000000,?,?), ref: 0082C03D
                            • EndPath.GDI32(00000000), ref: 0082C04D
                            • StrokePath.GDI32(00000000), ref: 0082C05B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                            • String ID:
                            • API String ID: 1539411459-0
                            • Opcode ID: 2bd94ecea24fc399b56795fc5ba660826eb3d9c05ed462e9652c66023fcd406d
                            • Instruction ID: e40890f761fad370e8598fe3531fff236fa631c75b9b6fd16824042427505b60
                            • Opcode Fuzzy Hash: 2bd94ecea24fc399b56795fc5ba660826eb3d9c05ed462e9652c66023fcd406d
                            • Instruction Fuzzy Hash: A5F05E32001669FBDB226F55AC09FDE3FA9BF06711F148120FB11A10E387B55566CB99
                            APIs
                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 007FA399
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 007FA3AC
                            • GetCurrentThreadId.KERNEL32 ref: 007FA3B3
                            • AttachThreadInput.USER32(00000000), ref: 007FA3BA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                            • String ID:
                            • API String ID: 2710830443-0
                            • Opcode ID: 1704a9b6bf5f454a7ef19c7b4b252c6548e60fed87d151dfc4689b68f0f0e9f1
                            • Instruction ID: 5c65c131cde24d40719441c42b367e5884146d838d38e51ca77056850bee5b51
                            • Opcode Fuzzy Hash: 1704a9b6bf5f454a7ef19c7b4b252c6548e60fed87d151dfc4689b68f0f0e9f1
                            • Instruction Fuzzy Hash: F1E03971541228BADB201FA2DD0CEE73F6CFF267A1F008034F70984061C6799541CBA0
                            APIs
                            • GetSysColor.USER32(00000008), ref: 007A2231
                            • SetTextColor.GDI32(?,000000FF), ref: 007A223B
                            • SetBkMode.GDI32(?,00000001), ref: 007A2250
                            • GetStockObject.GDI32(00000005), ref: 007A2258
                            • GetWindowDC.USER32(?,00000000), ref: 007DC0D3
                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 007DC0E0
                            • GetPixel.GDI32(00000000,?,00000000), ref: 007DC0F9
                            • GetPixel.GDI32(00000000,00000000,?), ref: 007DC112
                            • GetPixel.GDI32(00000000,?,?), ref: 007DC132
                            • ReleaseDC.USER32(?,00000000), ref: 007DC13D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                            • String ID:
                            • API String ID: 1946975507-0
                            • Opcode ID: 17ba4092bc80d486225765181b03b3fccfb00be9d0502d3bcecf8162485d7d09
                            • Instruction ID: 6d964b82711759283f567103425320237e2c0cfab2547bfbeacddc8baa89fea8
                            • Opcode Fuzzy Hash: 17ba4092bc80d486225765181b03b3fccfb00be9d0502d3bcecf8162485d7d09
                            • Instruction Fuzzy Hash: 6BE03932100244EADB225F68EC09BD83B30BB05332F04C377FB69880E287768992DB11
                            APIs
                            • GetCurrentThread.KERNEL32 ref: 007F8C63
                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,007F882E), ref: 007F8C6A
                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007F882E), ref: 007F8C77
                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,007F882E), ref: 007F8C7E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CurrentOpenProcessThreadToken
                            • String ID:
                            • API String ID: 3974789173-0
                            • Opcode ID: 5f1624378badcc4f09c7dbd9fddf10d02fc39c52d4cb27095e9b93c9c33110e2
                            • Instruction ID: 7a26ca15719bb6dea7c69c8c1023a3ec4d8795956ca3e46231f1ba9c5e03ee82
                            • Opcode Fuzzy Hash: 5f1624378badcc4f09c7dbd9fddf10d02fc39c52d4cb27095e9b93c9c33110e2
                            • Instruction Fuzzy Hash: 18E04F36642211DBD7705FB16D0DB563BB8FF55792F048878A345CA041DB348442CB61
                            APIs
                            • GetDesktopWindow.USER32 ref: 007E2187
                            • GetDC.USER32(00000000), ref: 007E2191
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007E21B1
                            • ReleaseDC.USER32(?), ref: 007E21D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: 29f87ea56203f0b98c51b188600cdc30cb7f258e231ef511ab0721bdb1eeaf49
                            • Instruction ID: 783d3011b6bce4075e27cb97ee2fc9e3d99469fbb4fc6f7d1735204c201ac906
                            • Opcode Fuzzy Hash: 29f87ea56203f0b98c51b188600cdc30cb7f258e231ef511ab0721bdb1eeaf49
                            • Instruction Fuzzy Hash: 5FE01AB5800604EFDB219F60C908A9D7BF5FB5C350F10C426FA5AA7222DB388142DF40
                            APIs
                            • GetDesktopWindow.USER32 ref: 007E219B
                            • GetDC.USER32(00000000), ref: 007E21A5
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007E21B1
                            • ReleaseDC.USER32(?), ref: 007E21D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: 2a7bb60c2a177cf8d861a9cff014f8224e60840f44e8be2f2e9b91474737218c
                            • Instruction ID: 6a5ddb922f2a87b2f1cb5123818dc62ba1f65ad785188f6171fb494bea9b8898
                            • Opcode Fuzzy Hash: 2a7bb60c2a177cf8d861a9cff014f8224e60840f44e8be2f2e9b91474737218c
                            • Instruction Fuzzy Hash: 92E01A75800204EFCB219F70C90869D7BF1FB5C310F10C026FA5AA7221DB389142DF40
                            APIs
                            • OleSetContainedObject.OLE32(?,00000001), ref: 007FB981
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ContainedObject
                            • String ID: AutoIt3GUI$Container
                            • API String ID: 3565006973-3941886329
                            • Opcode ID: 80f9444b7fe20a9efafe319384fddaa6d8b1080cdb78958f6737e0fa0e384e14
                            • Instruction ID: cd251437b592022d2b39a1e26807ac6d48412c1e25c93ab5d8370215058b4624
                            • Opcode Fuzzy Hash: 80f9444b7fe20a9efafe319384fddaa6d8b1080cdb78958f6737e0fa0e384e14
                            • Instruction Fuzzy Hash: C3913870600205DFDB24CF68C884A7ABBE9FF48710F14856EEA4ADB791DB74E844CB60
                            APIs
                              • Part of subcall function 007BFEC6: _wcscpy.LIBCMT ref: 007BFEE9
                              • Part of subcall function 007A9997: __itow.LIBCMT ref: 007A99C2
                              • Part of subcall function 007A9997: __swprintf.LIBCMT ref: 007A9A0C
                            • __wcsnicmp.LIBCMT ref: 0080B298
                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0080B361
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                            • String ID: LPT
                            • API String ID: 3222508074-1350329615
                            • Opcode ID: 88af118f44dd2e6c5504b4344c32d1420c10e8116ae3b66e67814f7689c23eb5
                            • Instruction ID: 41a3eb2ec628be801769eb292e35b1ba3fc78a6ddcb47dba551c80a02e6aeaf4
                            • Opcode Fuzzy Hash: 88af118f44dd2e6c5504b4344c32d1420c10e8116ae3b66e67814f7689c23eb5
                            • Instruction Fuzzy Hash: 57615C75A00219EFCB14DB94C885EAEB7F4FB49310F11816AF946EB391DB74AE40CB50
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: Oa{
                            • API String ID: 4104443479-1068949949
                            • Opcode ID: 99da79d75077651e25a122bbeca72b842dbb87da9c18944551f16d33347236ea
                            • Instruction ID: e866edd08e0e5cb12ed5905de330afba863c8fe3478520f6b1d785b1ac1a73d4
                            • Opcode Fuzzy Hash: 99da79d75077651e25a122bbeca72b842dbb87da9c18944551f16d33347236ea
                            • Instruction Fuzzy Hash: B65191B0A01649DFCF64CF69C880AAEBBF1FF49304F14852AE85AD7241EB34E955CB51
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 007B2AC8
                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 007B2AE1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: GlobalMemorySleepStatus
                            • String ID: @
                            • API String ID: 2783356886-2766056989
                            • Opcode ID: 02b6495f2bae211e4b1dac472cb1a44f97aee1c41b012185a4a1a4a8d89f1839
                            • Instruction ID: 3f6044a2ea2b653a45af1c1d4d1396eec2b0ba322d56852e0ecbb5ef72e0c6d9
                            • Opcode Fuzzy Hash: 02b6495f2bae211e4b1dac472cb1a44f97aee1c41b012185a4a1a4a8d89f1839
                            • Instruction Fuzzy Hash: 73515771518745DBD320AF10D88ABABBBE8FBC5310F42895DF2D9910A1EB348539CB26
                            APIs
                              • Part of subcall function 007A506B: __fread_nolock.LIBCMT ref: 007A5089
                            • _wcscmp.LIBCMT ref: 00809AAE
                            • _wcscmp.LIBCMT ref: 00809AC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: _wcscmp$__fread_nolock
                            • String ID: FILE
                            • API String ID: 4029003684-3121273764
                            • Opcode ID: 33371b8213fc3a40c138b6054c72a71b44acb73aea477fbd4f3ce3b5277ab9f8
                            • Instruction ID: 61fc612efc5cdc9da131936787601f184e91c39c37d967ed030f5e423c54f26f
                            • Opcode Fuzzy Hash: 33371b8213fc3a40c138b6054c72a71b44acb73aea477fbd4f3ce3b5277ab9f8
                            • Instruction Fuzzy Hash: 5B41D771A00619BADF209AA4DC85FEFBBBDEF85710F004169F940F71C1DA75AA048BA1
                            APIs
                            • _memset.LIBCMT ref: 00812892
                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 008128C8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CrackInternet_memset
                            • String ID: |
                            • API String ID: 1413715105-2343686810
                            • Opcode ID: ac6ad0f5bff4bcc0902a449713fffbb1d5b7e7ee7da7ee37e31783bf92bc0224
                            • Instruction ID: ec6bed2a82b60fe55a4236cdad0b93ac92495f0ef6f542d5e096659b8b90630e
                            • Opcode Fuzzy Hash: ac6ad0f5bff4bcc0902a449713fffbb1d5b7e7ee7da7ee37e31783bf92bc0224
                            • Instruction Fuzzy Hash: 68313971800119EFCF05AFA4DC89EEEBFB9FF09300F004129F814A6166DA355A56DBA0
                            APIs
                            • DestroyWindow.USER32(?,?,?,?), ref: 00826D86
                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00826DC2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$DestroyMove
                            • String ID: static
                            • API String ID: 2139405536-2160076837
                            • Opcode ID: 2c514d49e309b696966e59066ea05b750e6474fe147ebe4b11764aa8a7cc6c84
                            • Instruction ID: 872cd92b22626683486ee3577faa50e18f6fa197100ed97926029f9999bdaf3a
                            • Opcode Fuzzy Hash: 2c514d49e309b696966e59066ea05b750e6474fe147ebe4b11764aa8a7cc6c84
                            • Instruction Fuzzy Hash: B9316D71200618ABDB109F68DC84AFB77B9FF48764F108629F9A5D7190DA35ACA1CB60
                            APIs
                            • _memset.LIBCMT ref: 00802E00
                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00802E3B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: InfoItemMenu_memset
                            • String ID: 0
                            • API String ID: 2223754486-4108050209
                            • Opcode ID: 648df42f620d56e0a78abb3059b0d60f066cff42c1e3c467b86b29a2883af07c
                            • Instruction ID: dcf124324056b0998eebb35f439d1d9a536cc65f324b0ec119484300de01e696
                            • Opcode Fuzzy Hash: 648df42f620d56e0a78abb3059b0d60f066cff42c1e3c467b86b29a2883af07c
                            • Instruction Fuzzy Hash: 7331C331640309EBEB648F98CD4DBAEBBB9FF05350F14406EE985D61E2E7B09944CB50
                            APIs
                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 008269D0
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008269DB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: Combobox
                            • API String ID: 3850602802-2096851135
                            • Opcode ID: a9c7fee537761fe7017bba318e17337a02fc32503acf07e9a2b3d2030434ad4f
                            • Instruction ID: 59c940834a68a7d7ddc390f3ec09cf718ce881535ab159b14d37bad6a36c648f
                            • Opcode Fuzzy Hash: a9c7fee537761fe7017bba318e17337a02fc32503acf07e9a2b3d2030434ad4f
                            • Instruction Fuzzy Hash: AC11C4717002197FEF119F14DC80EBB3B6AFB993A4F114224F958D7291EA759CE187A0
                            APIs
                              • Part of subcall function 007A1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 007A1D73
                              • Part of subcall function 007A1D35: GetStockObject.GDI32(00000011), ref: 007A1D87
                              • Part of subcall function 007A1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 007A1D91
                            • GetWindowRect.USER32(00000000,?), ref: 00826EE0
                            • GetSysColor.USER32(00000012), ref: 00826EFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                            • String ID: static
                            • API String ID: 1983116058-2160076837
                            • Opcode ID: 5aa23af7166def022ffad9076e2a597dffd9abcab0ef8d44c6c9d5a4c57456c7
                            • Instruction ID: a3e177432108a9708e67c4f4cdb63dadb35555d3e7b122e2c98f8879246b12af
                            • Opcode Fuzzy Hash: 5aa23af7166def022ffad9076e2a597dffd9abcab0ef8d44c6c9d5a4c57456c7
                            • Instruction Fuzzy Hash: 0621447261021AAFDB04DFA8DD45AEA7BB8FB08314F114629FA55D2250E634A8A1DB60
                            APIs
                            • GetWindowTextLengthW.USER32(00000000), ref: 00826C11
                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00826C20
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: LengthMessageSendTextWindow
                            • String ID: edit
                            • API String ID: 2978978980-2167791130
                            • Opcode ID: 898962c4462033f437da2eb9fd5d564263effcd1a563231c9d15dcee4e1fd4d7
                            • Instruction ID: 6475ae7a52d2457d578198219be4c134d2c1c34766a2dd189d50ced50163e795
                            • Opcode Fuzzy Hash: 898962c4462033f437da2eb9fd5d564263effcd1a563231c9d15dcee4e1fd4d7
                            • Instruction Fuzzy Hash: 8F119A71501228ABEB109E64AC45ABA376AFB04378F604724FA61D31E0E775DCA1AB60
                            APIs
                            • _memset.LIBCMT ref: 00802F11
                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00802F30
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: InfoItemMenu_memset
                            • String ID: 0
                            • API String ID: 2223754486-4108050209
                            • Opcode ID: 128a4fff69b65e43740018df7b27f9b8753435aaf0df73df318610d5eebe2731
                            • Instruction ID: 8cb4c43e8008962ff4cf266f3c4d293d99f7da24575548f1693120a3f69b94ae
                            • Opcode Fuzzy Hash: 128a4fff69b65e43740018df7b27f9b8753435aaf0df73df318610d5eebe2731
                            • Instruction Fuzzy Hash: D111BB32901229ABCB70DA98DC08BA973B9FB01354F1940B5FC44F72E1EBF0AE048791
                            APIs
                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00812520
                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00812549
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Internet$OpenOption
                            • String ID: <local>
                            • API String ID: 942729171-4266983199
                            • Opcode ID: b5fa3536c15c61cc39190a413320ab4f23f6452de9fa9e6e9a038781ea436fa1
                            • Instruction ID: 212afee60846c2a552c085d40a82c22a48de68a9b77121b8fcd7d320737d3605
                            • Opcode Fuzzy Hash: b5fa3536c15c61cc39190a413320ab4f23f6452de9fa9e6e9a038781ea436fa1
                            • Instruction Fuzzy Hash: 5E11A070501225BEDB248F518CD9EFBFF6DFF16755F10812AF90586140E27069E5DAE0
                            APIs
                              • Part of subcall function 0081830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,008180C8,?,00000000,?,?), ref: 00818322
                            • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 008180CB
                            • htons.WSOCK32(00000000,?,00000000), ref: 00818108
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWidehtonsinet_addr
                            • String ID: 255.255.255.255
                            • API String ID: 2496851823-2422070025
                            • Opcode ID: 73bed7bd8467094d1d91b7a8af8939b9b1cb60fc48f1a1bd6ee83cf8e5358fe9
                            • Instruction ID: 2a9d6db1110f0f94422b35dce61df1ee9500d9e1e1cc38e8784736a9aef822a6
                            • Opcode Fuzzy Hash: 73bed7bd8467094d1d91b7a8af8939b9b1cb60fc48f1a1bd6ee83cf8e5358fe9
                            • Instruction Fuzzy Hash: F4118E75600209EBDB20AFA4CC86FFDB778FF44320F108626EA15D7292DA72A855C695
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 007FB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 007FB0E7
                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007F9355
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 372448540-1403004172
                            • Opcode ID: 55fce3863b1f8fcbf5be0b23b25d7cbea65a4dc6c2460489ea1f9fcab4e643e9
                            • Instruction ID: 2285ae5fc779ba94ce006864b5bc336efebe93d25b48af0e7ee2155dfe2ee7a5
                            • Opcode Fuzzy Hash: 55fce3863b1f8fcbf5be0b23b25d7cbea65a4dc6c2460489ea1f9fcab4e643e9
                            • Instruction Fuzzy Hash: 3C01DE71A45218EB8B08EBA4CC96DFE7769FF46320B100719FA72973D2EA39590CC650
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 007FB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 007FB0E7
                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 007F924D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 372448540-1403004172
                            • Opcode ID: de7bc472572701bba21896e28517a7af2548c63d385ca3d7516a4fe6dbea33a6
                            • Instruction ID: 2e6ae4c79fcd24c0eebe3fed2b9bbd5c52d08d8736d8b8993019da847a1b2c0d
                            • Opcode Fuzzy Hash: de7bc472572701bba21896e28517a7af2548c63d385ca3d7516a4fe6dbea33a6
                            • Instruction Fuzzy Hash: 22018471A41108FBCB18EBA0C996EFF77A8EF46300F140119BA1267382EA196F1CD661
                            APIs
                              • Part of subcall function 007A7F41: _memmove.LIBCMT ref: 007A7F82
                              • Part of subcall function 007FB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 007FB0E7
                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 007F92D0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 372448540-1403004172
                            • Opcode ID: 67a5ef7bf3140ff3ceb6637fab073287163a0a413d06032f755a3da4cfd897f0
                            • Instruction ID: 3e1db9bbb957b5f1dea29dae51c27f9ad2c6733235337514a8aacfcc42e8f9ee
                            • Opcode Fuzzy Hash: 67a5ef7bf3140ff3ceb6637fab073287163a0a413d06032f755a3da4cfd897f0
                            • Instruction Fuzzy Hash: C201A771A41108BBCF04E7A4C986EFF77ACAF11300F140215BA1263382EA195F0C9271
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: ClassName_wcscmp
                            • String ID: #32770
                            • API String ID: 2292705959-463685578
                            • Opcode ID: 9f41bb9326c6344fae174e34ec22e0db9fe8cb38c78ca3be739c34f56a904c4c
                            • Instruction ID: 73de9177b12953bfab91b0bc50cedadbc9568444097238b2e9b710506436152e
                            • Opcode Fuzzy Hash: 9f41bb9326c6344fae174e34ec22e0db9fe8cb38c78ca3be739c34f56a904c4c
                            • Instruction Fuzzy Hash: F2E0613250022C1BD32096D59C49F97F7BCFF44731F00016BFD10D3041D56099058BE1
                            APIs
                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007F81CA
                              • Part of subcall function 007C3598: _doexit.LIBCMT ref: 007C35A2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: Message_doexit
                            • String ID: AutoIt$Error allocating memory.
                            • API String ID: 1993061046-4017498283
                            • Opcode ID: 0b6a9be6944b2b57e71422943c800fbcff281f7802e044c6fc3928920e137cab
                            • Instruction ID: 36cfe941299625dc52393b0957cbbe54ae96d7b39f322a6080cecf6e597cd84f
                            • Opcode Fuzzy Hash: 0b6a9be6944b2b57e71422943c800fbcff281f7802e044c6fc3928920e137cab
                            • Instruction Fuzzy Hash: C4D0123238535872D62433A46C0EFCA76489B55B52F104029BB18956D389DA59D242D9
                            APIs
                              • Part of subcall function 007DB564: _memset.LIBCMT ref: 007DB571
                              • Part of subcall function 007C0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007DB540,?,?,?,007A100A), ref: 007C0B89
                            • IsDebuggerPresent.KERNEL32(?,?,?,007A100A), ref: 007DB544
                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,007A100A), ref: 007DB553
                            Strings
                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007DB54E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                            • API String ID: 3158253471-631824599
                            • Opcode ID: 4c8d99d8167f549d3ea13dd2d759f0d559680f6c7c8928b0ce3e745efb48ed75
                            • Instruction ID: 9169ffb6bef9e805249881d985f0ac8c1b99f9f553e963c6086e6c5ba73efea8
                            • Opcode Fuzzy Hash: 4c8d99d8167f549d3ea13dd2d759f0d559680f6c7c8928b0ce3e745efb48ed75
                            • Instruction Fuzzy Hash: 9AE039B0600350CBD320DF28E8087427BF0BB05714F018A2DE546C2352E7B8D405CBA1
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00825BF5
                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00825C08
                              • Part of subcall function 008054E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0080555E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709671525.00000000007A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007A0000, based on PE: true
                            • Associated: 00000000.00000002.1709623548.00000000007A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.000000000082F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709737670.0000000000855000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709779498.000000000085F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709796553.0000000000868000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7a0000_rinvoice.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: 2f0b4194e58473a5101d59c9f1c7501315fba31a3303553bf07ee041e3cedbb1
                            • Instruction ID: 1fd12392c7bf55651e088c984188c5a73349675e4d335a16ac6bfa349ec10533
                            • Opcode Fuzzy Hash: 2f0b4194e58473a5101d59c9f1c7501315fba31a3303553bf07ee041e3cedbb1
                            • Instruction Fuzzy Hash: A0D0A931388700BAE3B8AB30AC0BFD33A20FB10B01F000834BB06EA1D1C8E45801CA10