Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New order.exe

Overview

General Information

Sample name:New order.exe
Analysis ID:1482412
MD5:d69be8da083a01d8e8dbbcaae09508bb
SHA1:2a93d64a9247fc29a2329fc50a885c6496db3d60
SHA256:56db5a7b1e7589d53a3aff22480d05c02f87fc504b4f0e229ef38f3417ec5471
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Snake Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • New order.exe (PID: 532 cmdline: "C:\Users\user\Desktop\New order.exe" MD5: D69BE8DA083A01D8E8DBBCAAE09508BB)
    • RegSvcs.exe (PID: 1756 cmdline: "C:\Users\user\Desktop\New order.exe" MD5: 19855C0DC5BEC9FDF925307C57F9F5FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "jocelyne.bourbie@mam-hmmel.com", "Password": "t%qsN(y5t%qsN(y5", "Host": "us2.smtp.mailhostbox.com", "Port": "587", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x14a32:$a1: get_encryptedPassword
        • 0x14d1e:$a2: get_encryptedUsername
        • 0x1483e:$a3: get_timePasswordChanged
        • 0x14939:$a4: get_passwordField
        • 0x14a48:$a5: set_encryptedPassword
        • 0x160e8:$a7: get_logins
        • 0x1604b:$a10: KeyLoggerEventArgs
        • 0x15cb6:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1c4ad:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1b6df:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1bb12:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1cb51:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 16 entries
        SourceRuleDescriptionAuthorStrings
        0.2.New order.exe.600000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.New order.exe.600000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.New order.exe.600000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12c32:$a1: get_encryptedPassword
            • 0x12f1e:$a2: get_encryptedUsername
            • 0x12a3e:$a3: get_timePasswordChanged
            • 0x12b39:$a4: get_passwordField
            • 0x12c48:$a5: set_encryptedPassword
            • 0x142e8:$a7: get_logins
            • 0x1424b:$a10: KeyLoggerEventArgs
            • 0x13eb6:$a11: KeyLoggerEventArgsEventHandler
            0.2.New order.exe.600000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a6ad:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x198df:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19d12:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ad51:$a5: \Kometa\User Data\Default\Login Data
            0.2.New order.exe.600000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x13814:$s1: UnHook
            • 0x1381b:$s2: SetHook
            • 0x13823:$s3: CallNextHook
            • 0x13830:$s4: _hook
            Click to see the 15 entries

            System Summary

            barindex
            Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, QueryName: checkip.dyndns.org
            No Snort rule has matched
            Timestamp:2024-07-25T21:42:16.403806+0200
            SID:2803274
            Source Port:49163
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T21:42:17.394159+0200
            SID:2803274
            Source Port:49163
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T21:42:18.954171+0200
            SID:2803274
            Source Port:49166
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T21:42:20.435781+0200
            SID:2803274
            Source Port:49168
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T21:42:24.209092+0200
            SID:2803305
            Source Port:49173
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T21:42:22.187783+0200
            SID:2803274
            Source Port:49170
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T21:42:27.248664+0200
            SID:2803305
            Source Port:49177
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T21:42:19.483878+0200
            SID:2803305
            Source Port:49167
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T21:42:17.935655+0200
            SID:2803305
            Source Port:49165
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T21:42:22.783392+0200
            SID:2803305
            Source Port:49171
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "jocelyne.bourbie@mam-hmmel.com", "Password": "t%qsN(y5t%qsN(y5", "Host": "us2.smtp.mailhostbox.com", "Port": "587", "Version": "5.1"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: New order.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: New order.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49164 version: TLS 1.0
            Source: Binary string: wntdll.pdb source: New order.exe, 00000000.00000003.352210364.0000000002990000.00000004.00001000.00020000.00000000.sdmp, New order.exe, 00000000.00000003.352982771.0000000002B30000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E0DBBE
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DDC2A2 FindFirstFileExW,0_2_00DDC2A2
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E168EE FindFirstFileW,FindClose,0_2_00E168EE
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E1698F
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E0D076
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E0D3A9
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E19642
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E1979D
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E19B2B
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E15C97
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00266246h2_2_00266058
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00266BD0h2_2_00266058
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00268683h2_2_00268270
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00266F41h2_2_00266C81
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_00265578
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 002680C1h2_2_00267E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 002673A1h2_2_002670E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00267C61h2_2_002679A1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_00265BAA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00267801h2_2_00267540
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00268683h2_2_002685B2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_00265D8A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C5A31h2_2_006C5788
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C4021h2_2_006C3D78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CF021h2_2_006CED78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C3319h2_2_006C3070
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CE31Ah2_2_006CE070
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C7CF1h2_2_006C7A48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C6FE9h2_2_006C6D40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CD5E9h2_2_006CD340
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C89F9h2_2_006C8750
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C48D1h2_2_006C4628
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CF965h2_2_006CF628
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C3BC9h2_2_006C3920
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CEBC9h2_2_006CE920
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C62E1h2_2_006C6038
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CC8E1h2_2_006CC638
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C55D9h2_2_006C5330
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C6B91h2_2_006C68E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_006CA3E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CD191h2_2_006CCEE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C5E89h2_2_006C5BE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_006CA6FE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C85A1h2_2_006C82F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C7899h2_2_006C75F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CDE99h2_2_006CDBF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C3771h2_2_006C34C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CE771h2_2_006CE4C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C5181h2_2_006C4ED8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C4479h2_2_006C41D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CF479h2_2_006CF1D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C8149h2_2_006C7EA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CC461h2_2_006CC1B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_006CA2B7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C4D29h2_2_006C4A80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C7441h2_2_006C7198
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CDA41h2_2_006CD798
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006C6739h2_2_006C6490
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 006CCD39h2_2_006CCA90

            Networking

            barindex
            Source: Yara matchFile source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: reallyfreegeoip.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: reallyfreegeoip.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: reallyfreegeoip.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: reallyfreegeoip.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: reallyfreegeoip.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: reallyfreegeoip.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49164 version: TLS 1.0
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00E1CE44
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: RegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: RegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002409000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RegSvcs.exe, 00000002.00000002.882667110.0000000005865000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: New order.exe, 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: RegSvcs.exe, 00000002.00000002.882667110.0000000005850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
            Source: RegSvcs.exe, 00000002.00000002.882667110.0000000005850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
            Source: RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000242E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: RegSvcs.exe, 00000002.00000002.882370634.0000000002371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
            Source: RegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: New order.exe, 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
            Source: RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.334
            Source: RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
            Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49177
            Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
            Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49177 -> 443
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E1EAFF
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00E1ED6A
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E1EAFF
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00E0AA57
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E39576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00E39576

            System Summary

            barindex
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: New order.exe PID: 532, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: New order.exe PID: 532, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 1756, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 1756, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: New order.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: New order.exe, 00000000.00000000.349466812.0000000000E62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3c31609e-7
            Source: New order.exe, 00000000.00000000.349466812.0000000000E62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2f1a8557-9
            Source: New order.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b94fb81a-8
            Source: New order.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7edea71d-2
            Source: initial sampleStatic PE information: Filename: New order.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\New order.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00E0D5EB
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E01201
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00E0E8F6
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DABF400_2_00DABF40
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E120460_2_00E12046
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA80600_2_00DA8060
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E082980_2_00E08298
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DDE4FF0_2_00DDE4FF
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DD676B0_2_00DD676B
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E348730_2_00E34873
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DACAF00_2_00DACAF0
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DCCAA00_2_00DCCAA0
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DBCC390_2_00DBCC39
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DD6DD90_2_00DD6DD9
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA91C00_2_00DA91C0
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DBB1190_2_00DBB119
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC13940_2_00DC1394
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC17060_2_00DC1706
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC781B0_2_00DC781B
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC19B00_2_00DC19B0
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DB997D0_2_00DB997D
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA79200_2_00DA7920
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC7A4A0_2_00DC7A4A
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC7CA70_2_00DC7CA7
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC1C770_2_00DC1C77
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DD9EEE0_2_00DD9EEE
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E2BE440_2_00E2BE44
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC1F320_2_00DC1F32
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_001635F00_2_001635F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002630552_2_00263055
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002660582_2_00266058
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002638912_2_00263891
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002641302_2_00264130
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002629102_2_00262910
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026E1B02_2_0026E1B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002689882_2_00268988
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026DB612_2_0026DB61
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00263B702_2_00263B70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00262BF02_2_00262BF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00266C812_2_00266C81
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026CC902_2_0026CC90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026F4912_2_0026F491
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002655782_2_00265578
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002635B02_2_002635B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00267E002_2_00267E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026EE402_2_0026EE40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00263E512_2_00263E51
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026E7F92_2_0026E7F9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002670E02_2_002670E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002679A12_2_002679A1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026CC802_2_0026CC80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026C4F82_2_0026C4F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0026C5082_2_0026C508
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002655692_2_00265569
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_002675402_2_00267540
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_005300402_2_00530040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00530CE02_2_00530CE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_005306902_2_00530690
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_005313282_2_00531328
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C00402_2_006C0040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C8BA82_2_006C8BA8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C57882_2_006C5788
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C3D682_2_006C3D68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CA7602_2_006CA760
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C30602_2_006C3060
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CE0622_2_006CE062
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C3D782_2_006C3D78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CED782_2_006CED78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C57782_2_006C5778
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C30702_2_006C3070
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CE0702_2_006CE070
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C4A702_2_006C4A70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C7A482_2_006C7A48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C6D402_2_006C6D40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CD3402_2_006CD340
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CB4582_2_006CB458
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C87502_2_006C8750
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CA7502_2_006CA750
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C46282_2_006C4628
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CF6282_2_006CF628
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CC6282_2_006CC628
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C602B2_2_006C602B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C39202_2_006C3920
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CE9202_2_006CE920
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C53202_2_006C5320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C60382_2_006C6038
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CC6382_2_006CC638
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C7A382_2_006C7A38
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C53302_2_006C5330
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C6D302_2_006C6D30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CD3302_2_006CD330
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C9A182_2_006C9A18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C46192_2_006C4619
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CF61A2_2_006CF61A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C39142_2_006C3914
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C00172_2_006C0017
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C9A102_2_006C9A10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C82EC2_2_006C82EC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C68E82_2_006C68E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CA3E82_2_006CA3E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CCEE82_2_006CCEE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C5BE02_2_006C5BE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C75E02_2_006C75E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CDBE02_2_006CDBE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C82F82_2_006C82F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C75F02_2_006C75F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CDBF02_2_006CDBF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C34C82_2_006C34C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CE4C82_2_006CE4C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C41C82_2_006C41C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C4EC92_2_006C4EC9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C4ED82_2_006C4ED8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C68D82_2_006C68D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CCED82_2_006CCED8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C41D02_2_006C41D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CF1D02_2_006CF1D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C5BD02_2_006C5BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C7EA02_2_006C7EA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CC1B82_2_006CC1B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C34B82_2_006C34B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CA2B72_2_006CA2B7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C71882_2_006C7188
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CD7892_2_006CD789
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C4A802_2_006C4A80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C64802_2_006C6480
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CCA822_2_006CCA82
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C71982_2_006C7198
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CD7982_2_006CD798
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C64902_2_006C6490
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006CCA902_2_006CCA90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C7E902_2_006C7E90
            Source: C:\Users\user\Desktop\New order.exeCode function: String function: 00DC0A30 appears 46 times
            Source: C:\Users\user\Desktop\New order.exeCode function: String function: 00DBF9F2 appears 40 times
            Source: C:\Users\user\Desktop\New order.exeCode function: String function: 00DA9CB3 appears 31 times
            Source: New order.exe, 00000000.00000003.352567298.0000000002C30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs New order.exe
            Source: New order.exe, 00000000.00000002.355124317.00000000008D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegSvcs.exeT vs New order.exe
            Source: New order.exe, 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs New order.exe
            Source: New order.exe, 00000000.00000003.352210364.0000000002A6D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs New order.exe
            Source: New order.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: New order.exe PID: 532, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: New order.exe PID: 532, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: RegSvcs.exe PID: 1756, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: RegSvcs.exe PID: 1756, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.New order.exe.600000.0.raw.unpack, -m-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.New order.exe.600000.0.raw.unpack, -m-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.New order.exe.600000.0.raw.unpack, Az.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.New order.exe.600000.0.raw.unpack, Az.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@22/5
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E137B5 GetLastError,FormatMessageW,0_2_00E137B5
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E010BF AdjustTokenPrivileges,CloseHandle,0_2_00E010BF
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00E016C3
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00E151CD
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E2A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00E2A67C
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00E1648E
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00DA42A2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\New order.exeFile created: C:\Users\user\AppData\Local\Temp\autE8CA.tmpJump to behavior
            Source: New order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\New order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\New order.exe "C:\Users\user\Desktop\New order.exe"
            Source: C:\Users\user\Desktop\New order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New order.exe"
            Source: C:\Users\user\Desktop\New order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\New order.exeSection loaded: dwmapi.dllJump to behavior
            Source: New order.exeStatic file information: File size 1055232 > 1048576
            Source: New order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: New order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: New order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: New order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: New order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: New order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: New order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wntdll.pdb source: New order.exe, 00000000.00000003.352210364.0000000002990000.00000004.00001000.00020000.00000000.sdmp, New order.exe, 00000000.00000003.352982771.0000000002B30000.00000004.00001000.00020000.00000000.sdmp
            Source: New order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: New order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: New order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: New order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: New order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DA42DE
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC0A76 push ecx; ret 0_2_00DC0A89
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006C6028 push eax; ret 2_2_006C6029
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DBF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00DBF98E
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E31C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00E31C41
            Source: C:\Users\user\Desktop\New order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\New order.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97374
            Source: C:\Users\user\Desktop\New order.exeAPI/Special instruction interceptor: Address: 163214
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8964Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 856Jump to behavior
            Source: C:\Users\user\Desktop\New order.exeAPI coverage: 4.2 %
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E0DBBE
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DDC2A2 FindFirstFileExW,0_2_00DDC2A2
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E168EE FindFirstFileW,FindClose,0_2_00E168EE
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E1698F
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E0D076
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E0D3A9
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E19642
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E1979D
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E19B2B
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E15C97
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DA42DE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00266058 LdrInitializeThunk,2_2_00266058
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E1EAA2 BlockInput,0_2_00E1EAA2
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DD2622
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DA42DE
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC4CE8 mov eax, dword ptr fs:[00000030h]0_2_00DC4CE8
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00163480 mov eax, dword ptr fs:[00000030h]0_2_00163480
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_001634E0 mov eax, dword ptr fs:[00000030h]0_2_001634E0
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00161E70 mov eax, dword ptr fs:[00000030h]0_2_00161E70
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E00B62
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC09D5 SetUnhandledExceptionFilter,0_2_00DC09D5
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DD2622
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC083F
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DC0C21
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\New order.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\New order.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7EFDE008Jump to behavior
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E01201
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DE2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DE2BA5
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E0B226 SendInput,keybd_event,0_2_00E0B226
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00E222DA
            Source: C:\Users\user\Desktop\New order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E00B62
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E01663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00E01663
            Source: New order.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: New order.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DC0698 cpuid 0_2_00DC0698
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DD333F GetSystemTimeAsFileTime,0_2_00DD333F
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DFD27A GetUserNameW,0_2_00DFD27A
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DDB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00DDB952
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DA42DE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.882370634.000000000251C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.882370634.0000000002371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New order.exe PID: 532, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1756, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: New order.exeBinary or memory string: WIN_81
            Source: New order.exeBinary or memory string: WIN_XP
            Source: New order.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
            Source: New order.exeBinary or memory string: WIN_XPe
            Source: New order.exeBinary or memory string: WIN_VISTA
            Source: New order.exeBinary or memory string: WIN_7
            Source: New order.exeBinary or memory string: WIN_8
            Source: Yara matchFile source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New order.exe PID: 532, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1756, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.New order.exe.600000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New order.exe.600000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.882370634.000000000251C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.882370634.0000000002371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New order.exe PID: 532, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1756, type: MEMORYSTR
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E21204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00E21204
            Source: C:\Users\user\Desktop\New order.exeCode function: 0_2_00E21806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00E21806
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
            Valid Accounts
            3
            Obfuscated Files or Information
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS126
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            2
            Valid Accounts
            LSA Secrets22
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts111
            Virtualization/Sandbox Evasion
            Cached Domain Credentials111
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
            Access Token Manipulation
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
            Process Injection
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            Remote System Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
            System Network Configuration Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            New order.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://crl.entrust.net/server1.crl00%URL Reputationsafe
            http://ocsp.entrust.net030%URL Reputationsafe
            http://checkip.dyndns.org/q0%URL Reputationsafe
            http://reallyfreegeoip.org0%URL Reputationsafe
            https://reallyfreegeoip.org0%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            http://checkip.dyndns.com0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://secure.comodo.com/CPS00%URL Reputationsafe
            http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
            https://reallyfreegeoip.org/xml/8.46.123.3340%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            188.114.97.3
            truetrue
              unknown
              checkip.dyndns.com
              193.122.6.168
              truefalse
                unknown
                checkip.dyndns.org
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.org/xml/8.46.123.33false
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl0RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.entrust.net/server1.crl0RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.entrust.net03RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.org/qNew order.exe, 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000242E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.diginotar.nl/cps/pkioverheid0RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002409000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024B6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.entrust.net0DRegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.org/xml/8.46.123.334RegSvcs.exe, 00000002.00000002.882370634.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002500000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.000000000250E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.00000000024D3000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.882370634.0000000002371000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://secure.comodo.com/CPS0RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.entrust.net/2048ca.crl0RegSvcs.exe, 00000002.00000002.882289016.00000000007C2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.org/xml/New order.exe, 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882370634.0000000002415000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  188.114.97.3
                  reallyfreegeoip.orgEuropean Union
                  13335CLOUDFLARENETUStrue
                  193.122.6.168
                  checkip.dyndns.comUnited States
                  31898ORACLE-BMC-31898USfalse
                  188.114.96.3
                  unknownEuropean Union
                  13335CLOUDFLARENETUSfalse
                  158.101.44.242
                  unknownUnited States
                  31898ORACLE-BMC-31898USfalse
                  132.226.247.73
                  unknownUnited States
                  16989UTMEMUSfalse
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1482412
                  Start date and time:2024-07-25 21:41:19 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 4s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:New order.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/4@22/5
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 62
                  • Number of non-executed functions: 286
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • VT rate limit hit for: New order.exe
                  TimeTypeDescription
                  15:42:12API Interceptor9608487x Sleep call for process: RegSvcs.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  188.114.97.3Notepad3_v6.23.203.2.exeGet hashmaliciousAmadey, GO BackdoorBrowse
                  • downloaddining2.com/h9fmdW6/index.php
                  Quotation.exeGet hashmaliciousFormBookBrowse
                  • www.bahisanaliz16.xyz/ty31/?nfuxZr=JoA2dMXfLBqFXt4x+LwNr+felGYfgJXJPNkjuKbt07zo6G2Rowrau43mkNbOTfffhSkjLsiciQ==&v6AxO=1bjHLvGh8ZYHMfZp
                  LisectAVT_2403002B_412.exeGet hashmaliciousFormBookBrowse
                  • www.whatareyoucraving.com/drbb/
                  AVISO DE PAGO.xlsGet hashmaliciousUnknownBrowse
                  • tny.wtf/pqv2p
                  AVISO DE PAGO.xlsGet hashmaliciousUnknownBrowse
                  • tny.wtf/pqv2p
                  AVISO DE PAGO.xlsGet hashmaliciousUnknownBrowse
                  • tny.wtf/pqv2p
                  PO S0042328241130.xlsGet hashmaliciousRemcosBrowse
                  • tny.wtf/vMCQY
                  LisectAVT_2403002B_89.exeGet hashmaliciousCobaltStrikeBrowse
                  • cccc.yiuyiu.xyz/config.ini
                  irlsever.docGet hashmaliciousFormBookBrowse
                  • www.ninunveiled.shop/y2xs/
                  Scan copy.xlsGet hashmaliciousUnknownBrowse
                  • tny.wtf/3VC
                  193.122.6.168Payment_Advice.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • checkip.dyndns.org/
                  Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • checkip.dyndns.org/
                  Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • checkip.dyndns.org/
                  SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • checkip.dyndns.org/
                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                  • checkip.dyndns.org/
                  Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • checkip.dyndns.org/
                  Orden de Compra..exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                  • checkip.dyndns.org/
                  Fekdjuvq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • checkip.dyndns.org/
                  neworder.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • checkip.dyndns.org/
                  ORDER INQUIRY_QTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • checkip.dyndns.org/
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  reallyfreegeoip.orgNew Order.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                  • 188.114.96.3
                  Payment_Advice.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 188.114.97.3
                  LPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 188.114.97.3
                  Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 188.114.96.3
                  Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 188.114.97.3
                  Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 188.114.96.3
                  Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                  • 188.114.97.3
                  DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 188.114.97.3
                  Deye Union - PO # 23081377.exeGet hashmaliciousSnake KeyloggerBrowse
                  • 188.114.97.3
                  rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                  • 188.114.97.3
                  checkip.dyndns.comNew Order.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                  • 193.122.130.0
                  Payment_Advice.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  LPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 132.226.247.73
                  Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 158.101.44.242
                  Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                  • 132.226.247.73
                  DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 158.101.44.242
                  Confirmation transfer Note AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 158.101.44.242
                  Deye Union - PO # 23081377.exeGet hashmaliciousSnake KeyloggerBrowse
                  • 132.226.247.73
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ORACLE-BMC-31898UShttp://docusign.netGet hashmaliciousUnknownBrowse
                  • 192.29.14.118
                  New Order.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                  • 193.122.130.0
                  Payment_Advice.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 158.101.44.242
                  Lisect_AVT_24003_G1B_67.exeGet hashmaliciousUnknownBrowse
                  • 158.101.28.51
                  DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 158.101.44.242
                  Confirmation transfer Note AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 158.101.44.242
                  counter.exeGet hashmaliciousBdaejecBrowse
                  • 158.101.87.161
                  CLOUDFLARENETUSLisectAVT_2403002A_328.exeGet hashmaliciousPetite VirusBrowse
                  • 172.65.251.78
                  LisectAVT_2403002A_328.exeGet hashmaliciousPetite VirusBrowse
                  • 172.65.251.78
                  http://link.mail.beehiiv.com/ss/c/u001.6C5fb2jgNhK_7sih4vM3VZa9fE9tHBc9fWZLirgY7_MATRo7_qx7xDq5ZlnkMcO1QobynJ6PiItP4Wtcapt8tiaBcTbWM1w1MHuIiN_t_ffA_hJhmN8MgAW_Y4IPUoI18R3nDq7jKhCU2UyzKyGI-fgPaHIzb3B6lUScBqw8xPWbXjB75jecemYLrKDX4KUr-zoRsTXM9LiZoNgvebiUwr439T1w9eWAafMqLUrMmXf67xVVD06E3Mfgln_ZkjRbhq6eRPto7d31e2ehnl7ulSLrJ4gjMw3GY4GdHZvuq26IrF7i22I755PxTKhdknNtngs2viqOUFQQVIP0HbwfHtnQ1psNsvMNcdTn_ikKemXjj5BG-TL68QdV2eLeME8V/48b/lZFswvdpTSWokKOzLlv9VQ/h6/h001.Y7M0U38MQ2nd1AVwnxBJwxsMy_vK5DUT5ew04LeckYc#KENT.GREEN@GELITA.COMGet hashmaliciousUnknownBrowse
                  • 172.67.196.116
                  LisectAVT_2403002A_337.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                  • 172.67.206.236
                  LisectAVT_2403002A_340.exeGet hashmaliciousCryptbotBrowse
                  • 104.21.76.57
                  EXTERNAL 9 Held.msgGet hashmaliciousUnknownBrowse
                  • 1.1.1.1
                  https://arborstaff.freshdesk.com/en/support/solutions/articles/153000192392-new-docucment-shared-with-youGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  FW_ _EXTERNAL_ ocstock Shared Document-2.msgGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                  • 104.17.25.14
                  LisectAVT_2403002A_368.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                  • 162.159.138.232
                  042240724.xlsGet hashmaliciousRemcosBrowse
                  • 104.21.31.82
                  CLOUDFLARENETUSLisectAVT_2403002A_328.exeGet hashmaliciousPetite VirusBrowse
                  • 172.65.251.78
                  LisectAVT_2403002A_328.exeGet hashmaliciousPetite VirusBrowse
                  • 172.65.251.78
                  http://link.mail.beehiiv.com/ss/c/u001.6C5fb2jgNhK_7sih4vM3VZa9fE9tHBc9fWZLirgY7_MATRo7_qx7xDq5ZlnkMcO1QobynJ6PiItP4Wtcapt8tiaBcTbWM1w1MHuIiN_t_ffA_hJhmN8MgAW_Y4IPUoI18R3nDq7jKhCU2UyzKyGI-fgPaHIzb3B6lUScBqw8xPWbXjB75jecemYLrKDX4KUr-zoRsTXM9LiZoNgvebiUwr439T1w9eWAafMqLUrMmXf67xVVD06E3Mfgln_ZkjRbhq6eRPto7d31e2ehnl7ulSLrJ4gjMw3GY4GdHZvuq26IrF7i22I755PxTKhdknNtngs2viqOUFQQVIP0HbwfHtnQ1psNsvMNcdTn_ikKemXjj5BG-TL68QdV2eLeME8V/48b/lZFswvdpTSWokKOzLlv9VQ/h6/h001.Y7M0U38MQ2nd1AVwnxBJwxsMy_vK5DUT5ew04LeckYc#KENT.GREEN@GELITA.COMGet hashmaliciousUnknownBrowse
                  • 172.67.196.116
                  LisectAVT_2403002A_337.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                  • 172.67.206.236
                  LisectAVT_2403002A_340.exeGet hashmaliciousCryptbotBrowse
                  • 104.21.76.57
                  EXTERNAL 9 Held.msgGet hashmaliciousUnknownBrowse
                  • 1.1.1.1
                  https://arborstaff.freshdesk.com/en/support/solutions/articles/153000192392-new-docucment-shared-with-youGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  FW_ _EXTERNAL_ ocstock Shared Document-2.msgGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                  • 104.17.25.14
                  LisectAVT_2403002A_368.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                  • 162.159.138.232
                  042240724.xlsGet hashmaliciousRemcosBrowse
                  • 104.21.31.82
                  ORACLE-BMC-31898UShttp://docusign.netGet hashmaliciousUnknownBrowse
                  • 192.29.14.118
                  New Order.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                  • 193.122.130.0
                  Payment_Advice.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 193.122.6.168
                  Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 158.101.44.242
                  Lisect_AVT_24003_G1B_67.exeGet hashmaliciousUnknownBrowse
                  • 158.101.28.51
                  DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 158.101.44.242
                  Confirmation transfer Note AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  • 158.101.44.242
                  counter.exeGet hashmaliciousBdaejecBrowse
                  • 158.101.87.161
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  05af1f5ca1b87cc9cc9b25185115607d042240724.xlsGet hashmaliciousRemcosBrowse
                  • 188.114.97.3
                  SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 188.114.97.3
                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                  • 188.114.97.3
                  dukas022.docx.docGet hashmaliciousUnknownBrowse
                  • 188.114.97.3
                  S004232824113048.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 188.114.97.3
                  VERDACHT_New Order 8025047.docxGet hashmaliciousVIP KeyloggerBrowse
                  • 188.114.97.3
                  aabJ5lAG3l.docGet hashmaliciousUnknownBrowse
                  • 188.114.97.3
                  5i4hBrTNHm.rtfGet hashmaliciousAgentTeslaBrowse
                  • 188.114.97.3
                  D9p6evtbwe.rtfGet hashmaliciousUnknownBrowse
                  • 188.114.97.3
                  Purchase Order - P04737.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 188.114.97.3
                  No context
                  Process:C:\Users\user\Desktop\New order.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):95128
                  Entropy (8bit):7.928837197531822
                  Encrypted:false
                  SSDEEP:1536:4DimrSxVEmo+gmgEo+MjFE4mHDARaibH2sNaDuwF+l597b/03vENtx30avrMUA5d:Ir6tBrIFE47bRNlwFub/UvYXlZT1U
                  MD5:FB83F8B9DFD1554EC354974843BA76AE
                  SHA1:1B869993491BA981C011653E3EE4C7BEE9CE3A39
                  SHA-256:B1818E003DABCE91D5F3334FB72FD14DABE8EAD2162B01E17C0D807BD671A142
                  SHA-512:CC0DEAC02E4B9E6B9D7B8A62D3F420F931FE6DC00E6334A129A02108AF8AE7B223FD98FE17AD7C96E4BC85176426D63A92DC53228AD4AEE0BAE0F4938F9D600D
                  Malicious:false
                  Reputation:low
                  Preview:EA06.....G8.:.BkU.Rf4-V.I..h...^.5....J.".I.....#..@.J5..G...9.i...,.....9..2)...V.H....U?.......sp.....c-.Q(....&c7J.V.[.R}..<...[ZEb.B.E..=.FkU..;..Z...0.".N..".... .T..@....&u0..i....R.n.N.@..k..Mb.I..].J......W.."1..W.J.....J.|......n.Z...G...Bk.."..O2.P@......%J.P.."| .d..;.L&..'.J."..Z......;....V.t..+2..N.\....ZE`...T.&~.L...........y..+..d.mq.U.J.2..DvkT.|6.Q...?....k:.x.s..kT.#....1.V+`.Z......2&."X..K8.!$.D....,........Rh..L@..p.!'.f+`.....R.6*.".c..h...^.?...+....Mh.I..5........I....0"..p.Rg|*.".M.D....^...X.t*..O..k..P.#O..(.ZE..V..*....W].Ri2.e.U.O*..ln)&.....-B.]......".H.X..{tR.W.G..*...c.X.t..B.S..o...\..lqy... .Ul.}X..Rc...N.P..@.J...,..-^.1.S,q9.....Mm..^..T...zD.kU..s.}BkS.zf4*..uI....M^]...&r.".C........4..3:...Z..f.)m..T..39..T........Si3....X...j...#..i.....1..h..5..5..T.`..K..! ....U.m..Eb.J.I..J.....O....G;..n...2.2..@.K.N.R.J...l^.W........u...=&cF......Ix...z|.p.B\-..w0.. ..|...J.."..U...M&cl.Te...R.1.].U.......jT..2.
                  Process:C:\Users\user\Desktop\New order.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):9746
                  Entropy (8bit):7.624159192641296
                  Encrypted:false
                  SSDEEP:192:CZIUd0q813En0F2U7dVmz0jdGYlrO2y7phObWXwic+1RjP8AsT0WAI:Yd0x1Un0gU7u4jd7rvIWMw2/jP8AsTsI
                  MD5:A4A6346C899B2C81657AC63B3871961B
                  SHA1:C62093995E53D02D2E11D8229E3AADDFD63CC6E1
                  SHA-256:B566C0ACCEEC44E0214844FEF8741CB25D10089631DF04A00F76441DBBEF81DF
                  SHA-512:1DEE887D661EB692801B6FEA8DC96BB858F560E2EDEF15DC9EF76698758169FC5BF6CE6DD8241568CEB82EEB178B11345FC1E81CC05C4D3691361AB6D993484B
                  Malicious:false
                  Reputation:low
                  Preview:EA06..p..^..y..e.L..[-.e4....y..sd.N,....e8.N.si..md..&..]....9...K........|.0.o..d..,......:..@..;.Y'sP.......4.Z..o;..6.`.o.p..Y@.....g.;..f.P..Y@...N..i.........;......r.'Sy...c ....Ac.H.....(.F.3<..Y..6...4.d........x..n....Bv.....X. 0....+$.r...Y..5_..l.....5_..t.U..`5_....U...5_..d.U...5\..>30..N.^.c.Z..o8.z..s8......@.....s...G. /Z.N'`.....jv....r.u....$.../.s:...g G_T......l.>_.......zo7.........s@.......@...........`.M..`... ...e...@..8.'.6.Y.{>K$..c.M.`..Y'.._..t......>K #G.d..3|vY..G.6.Yf.8_..oe..i|vY....e.h.,.0......-..9.M..kE...Ng.P;..:.N..P.L..6...f..+(.ffvI...8.N.....f.@.E...Y....3.i.....N@......vi.....P.....2p....<d....,vf........N.!+(.'&`....,fs4...I.......r.4.X...c3.4.ih.Y.!...Gf.....,f.;.... .#9.....c.P........t.h.s.....,vj...$..t.L....40.....f....N.s....4..@.6.-..p..S.=..4...SP.N...;7.`..;.M.....o:.....c.p..Y.s.wx.....vp........E....N.y6....p.c3.5..6..b.!....F ...@B5e.Mgs........vr......fV[5.v...B3p....;:.X...c.NA..0........g@....&.<..e...
                  Process:C:\Users\user\Desktop\New order.exe
                  File Type:FGDC-STD-001-1998
                  Category:dropped
                  Size (bytes):28674
                  Entropy (8bit):3.576585734584764
                  Encrypted:false
                  SSDEEP:384:gAQK3ObXwQ4/6BdBsM6IYj84F5RduHE3cLu2FqOwtsVdfGbLph1juTJOtHtiP:PQKeP3sMMIEuVK2FMtsfGbLph1jXtAP
                  MD5:F3086E715B2E86256412D88AAFADD0AA
                  SHA1:7A547F3A4A9583022700E92AD1E0B1BFC3430AA0
                  SHA-256:32AD9D4A17CFEB57A9F2378F49AF17D7212AF6232578F0854B1A79DC78D1EFB2
                  SHA-512:D8EA447FFD68E7ED040594FF8DE902DA3DC096EAFF4BBAC6A73DB7DB514E38E67786C679559EEB8B775DAB8BFCE4CF49097DF1634605165334AAFCAD200D633E
                  Malicious:false
                  Reputation:low
                  Preview:2z77:dge:3geee2422227879d:8d22222288:;67:6d;8722222288:;6f:8dc9422222288:;77::d:8g22222288:;67:cd;8722222288:;6f:edc8e22222288:;77:gd:5522222288:;67;2d;5422222288:;6f;4dc4g22222288:;77;6d:8622222288:;67;8d;8e22222288:;6f;:dc8e22222288:;77;c55e288:;67;ed;8g22222288:;:f66hhhhhhdc9622222288:;;768hhhhhhd:8622222288:;:76:hhhhhhd;8e22222288:;:f6chhhhhhdc8e22222288:;;76ehhhhhhd:4g22222288:;:76ghhhhhhd;8622222288:;:f72hhhhhhdc8e22222288:;;774hhhhhhd:8e22222288:;:776hhhhhh55e;88:;:f78hhhhhhdc9722222288:;77f2d:9522222288:;67f4d;8722222288:;6ff6dc9422222288:;77f8d:5522222288:;67f:d;5422222288:;6ffcdc4g22222288:;77fed:8622222288:;67fgd;8e22222288:;6fg2dc8e22222288:;77g455e288:;67g6d;8322222288:;:f8:hhhhhhdc8622222288:;;78chhhhhhd:9822222288:;:78ehhhhhhd;8322222288:;:f8ghhhhhhdc9222222288:;;792hhhhhhd:8;22222288:;:794hhhhhhd;5522222288:;:f96hhhhhhdc5422222288:;;798hhhhhhd:4g22222288:;:79:hhhhhhd;8622222288:;:f9chhhhhhdc8e22222288:;;79ehhhhhhd:8e22222288:;:79ghhhhhh55e;88:;6f:2dc9522222288:;77c2d:8:
                  Process:C:\Users\user\Desktop\New order.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):133632
                  Entropy (8bit):6.91313081716523
                  Encrypted:false
                  SSDEEP:1536:0cxP+7cCYPWSwvGpkTFU7139+KZTSfXeSRpZFw3EPIE5AHuOhmpuCCj1Z1XCI42H:04P+7LlwMpXw+AHuOhZpC+4Sb
                  MD5:B9D196E3188E727E4901E1D0E2E0613A
                  SHA1:892538F94B42358EF15C017FEBC07035F1A2D5BE
                  SHA-256:27E2ACBA9809E03A380AA14476E0BF3951F9E6876877B945CC3DCD7FD52A04F2
                  SHA-512:F5ECBF6069FC1346B96CF6DB1A0FED5508AC4978EC0C15714F65806E0DBE6B45C15BD5DB006EDB2850D585C6D73E97C024BC2178FAF73EC430348F951B17D947
                  Malicious:false
                  Reputation:low
                  Preview:x..STP5UHI1B..ZI.5FPSWP5.LI1BUHZII5FPSWP5ULI1BUHZII5FPSWP5UL.1BUFE.G5.Y.v.4..he*<;z9;Z!"2:pV4"'^6u*?i;@(p:9pq..i\-1-tDD?bPSWP5UL.tBU.[JI.k.5WP5ULI1B.HXHB4.PS.Q5UXI1BUHZ.Z7FPsWP5uNI1B.HZiI5FRSWT5ULI1BULZII5FPSW07ULK1BUHZIK5..SW@5U\I1BUXZIY5FPSWP%ULI1BUHZII5"CQW.5ULI.@U.JII5FPSWP5ULI1BUHZIIuDP_WP5ULI1BUHZII5FPSWP5ULI1BUHZII5FPSWP5ULI1BUHZII5FPSWp5UDI1BUHZII5FP[wP5.LI1BUHZII5F~'2(AULI..THZiI5F.RWP7ULI1BUHZII5FPSwP55b;B06HZI.%FPSwR5U^I1B.IZII5FPSWP5ULIqBU.t;,Y)3SW\5ULIq@UHXII5NRSWP5ULI1BUHZI.5F.SWP5ULI1BUHZII5F.@UP5ULIyBUHXIL5.qRW$.ULJ1BU.ZIO.gQS.P5ULI1BUHZII5FPSWP5ULI1BUHZII5FPSWP5ULI1BUH.4.:..>#..LI1BUH[KJ1@X[WP5ULI1B+HZI.5FP.WP5bLI1gUHZ$I5FtSWPKULIOBUH>II54PSW15UL.1BU'ZII[FPS)P5URK.bUHPco5DxrWP?Uf.B`UHP.H5FT tP5_.K1BQ;~II?.SSWTFpLI;.QHZM:.FPY.U5UHckBV.LOI5]?jWP?UO.$DUHAco5DxiWP?Ufo1A.]\II.lrSU.<ULM..&UZIO..PS]$<ULK.HUH^cW7n.SWZ.w2Y1BQcZckKWPSS{5.n7#BULqIc.8CSWT.UfkOVUH^bI.XR.CP5QfkOWUH^bI.d.EWP1~Lc.<BHZMb5lNQ.G5UHc7h7H(5U56S<.P5Sd.1B_`:II3FziW..ULM3-.HZCo..PQ.S4UFI3A(~ZIM7B-dWP1..I39lH
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.8724658376236265
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:New order.exe
                  File size:1'055'232 bytes
                  MD5:d69be8da083a01d8e8dbbcaae09508bb
                  SHA1:2a93d64a9247fc29a2329fc50a885c6496db3d60
                  SHA256:56db5a7b1e7589d53a3aff22480d05c02f87fc504b4f0e229ef38f3417ec5471
                  SHA512:1aace401206344e31c6f9c1463a89ae786bc7a151b91bd546b8ddad5c70a1859f945ccc23f1448bd2592375678c6b8978ff41b496eb3134e3c7372e485db5f01
                  SSDEEP:24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8aZwGedJ:ITvC/MTQYxsWR7aZL
                  TLSH:9125AF027391C022FF9B96334F5AF6515BBC69260123E62F13981D7ABE701B1563E7A3
                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                  Icon Hash:aaf3e3e3938382a0
                  Entrypoint:0x420577
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                  Time Stamp:0x669EE76A [Mon Jul 22 23:12:42 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:948cc502fe9226992dce9417f952fce3
                  Instruction
                  call 00007F1FB10C1513h
                  jmp 00007F1FB10C0E1Fh
                  push ebp
                  mov ebp, esp
                  push esi
                  push dword ptr [ebp+08h]
                  mov esi, ecx
                  call 00007F1FB10C0FFDh
                  mov dword ptr [esi], 0049FDF0h
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  and dword ptr [ecx+04h], 00000000h
                  mov eax, ecx
                  and dword ptr [ecx+08h], 00000000h
                  mov dword ptr [ecx+04h], 0049FDF8h
                  mov dword ptr [ecx], 0049FDF0h
                  ret
                  push ebp
                  mov ebp, esp
                  push esi
                  push dword ptr [ebp+08h]
                  mov esi, ecx
                  call 00007F1FB10C0FCAh
                  mov dword ptr [esi], 0049FE0Ch
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  and dword ptr [ecx+04h], 00000000h
                  mov eax, ecx
                  and dword ptr [ecx+08h], 00000000h
                  mov dword ptr [ecx+04h], 0049FE14h
                  mov dword ptr [ecx], 0049FE0Ch
                  ret
                  push ebp
                  mov ebp, esp
                  push esi
                  mov esi, ecx
                  lea eax, dword ptr [esi+04h]
                  mov dword ptr [esi], 0049FDD0h
                  and dword ptr [eax], 00000000h
                  and dword ptr [eax+04h], 00000000h
                  push eax
                  mov eax, dword ptr [ebp+08h]
                  add eax, 04h
                  push eax
                  call 00007F1FB10C3BBDh
                  pop ecx
                  pop ecx
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  lea eax, dword ptr [ecx+04h]
                  mov dword ptr [ecx], 0049FDD0h
                  push eax
                  call 00007F1FB10C3C08h
                  pop ecx
                  ret
                  push ebp
                  mov ebp, esp
                  push esi
                  mov esi, ecx
                  lea eax, dword ptr [esi+04h]
                  mov dword ptr [esi], 0049FDD0h
                  push eax
                  call 00007F1FB10C3BF1h
                  test byte ptr [ebp+08h], 00000001h
                  pop ecx
                  Programming Language:
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x2ae14.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xff0000x7594.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xd40000x2ae140x2b00024fa54a183c4febe583b48c831b2a570False0.8496264080668605data7.697211368548516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xff0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xd44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                  RT_ICON0xd45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                  RT_ICON0xd48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                  RT_ICON0xd49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                  RT_ICON0xd58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                  RT_ICON0xd61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                  RT_ICON0xd66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                  RT_ICON0xd8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                  RT_ICON0xd9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                  RT_STRING0xda1480x594dataEnglishGreat Britain0.3333333333333333
                  RT_STRING0xda6dc0x68adataEnglishGreat Britain0.2735961768219833
                  RT_STRING0xdad680x490dataEnglishGreat Britain0.3715753424657534
                  RT_STRING0xdb1f80x5fcdataEnglishGreat Britain0.3087467362924282
                  RT_STRING0xdb7f40x65cdataEnglishGreat Britain0.34336609336609336
                  RT_STRING0xdbe500x466dataEnglishGreat Britain0.3605683836589698
                  RT_STRING0xdc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                  RT_RCDATA0xdc4100x224acdata1.0003630926954292
                  RT_GROUP_ICON0xfe8bc0x76dataEnglishGreat Britain0.6610169491525424
                  RT_GROUP_ICON0xfe9340x14dataEnglishGreat Britain1.15
                  RT_VERSION0xfe9480xdcdataEnglishGreat Britain0.6181818181818182
                  RT_MANIFEST0xfea240x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                  DLLImport
                  WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                  MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                  WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                  PSAPI.DLLGetProcessMemoryInfo
                  IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                  USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                  UxTheme.dllIsThemeActive
                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                  USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                  GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                  SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                  OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                  Language of compilation systemCountry where language is spokenMap
                  EnglishGreat Britain
                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                  2024-07-25T21:42:16.403806+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4916380192.168.2.22193.122.6.168
                  2024-07-25T21:42:17.394159+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4916380192.168.2.22193.122.6.168
                  2024-07-25T21:42:18.954171+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4916680192.168.2.22132.226.247.73
                  2024-07-25T21:42:20.435781+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4916880192.168.2.22132.226.247.73
                  2024-07-25T21:42:24.209092+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49173443192.168.2.22188.114.96.3
                  2024-07-25T21:42:22.187783+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4917080192.168.2.22193.122.6.168
                  2024-07-25T21:42:27.248664+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49177443192.168.2.22188.114.96.3
                  2024-07-25T21:42:19.483878+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49167443192.168.2.22188.114.96.3
                  2024-07-25T21:42:17.935655+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49165443192.168.2.22188.114.97.3
                  2024-07-25T21:42:22.783392+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49171443192.168.2.22188.114.97.3
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 25, 2024 21:42:13.473586082 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:13.479618073 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:13.479711056 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:13.480521917 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:13.490974903 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:15.572587013 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:15.587784052 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:15.592782021 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:16.195331097 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:16.264812946 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.264857054 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.264898062 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.271517038 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.271534920 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.403691053 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:16.403805971 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:16.781369925 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.781455994 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.786537886 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.786551952 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.786875010 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.858737946 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.904504061 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.974906921 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.974996090 CEST44349164188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:16.975042105 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.985126019 CEST49164443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:16.999799967 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:17.006148100 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:17.191009998 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:17.193700075 CEST49165443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:17.193744898 CEST44349165188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:17.193799973 CEST49165443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:17.194200993 CEST49165443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:17.194216967 CEST44349165188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:17.394159079 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:17.784493923 CEST44349165188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:17.794878006 CEST49165443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:17.794903040 CEST44349165188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:17.935676098 CEST44349165188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:17.935779095 CEST44349165188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:17.935950041 CEST49165443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:17.936542988 CEST49165443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:17.958034039 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:17.963731050 CEST8049163193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:17.963818073 CEST4916380192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:17.983711958 CEST4916680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:17.988636971 CEST8049166132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:17.988712072 CEST4916680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:17.988842964 CEST4916680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:17.993654013 CEST8049166132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:18.754221916 CEST8049166132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:18.773329020 CEST49167443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:18.773384094 CEST44349167188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:18.773448944 CEST49167443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:18.773962021 CEST49167443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:18.773982048 CEST44349167188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:18.954170942 CEST4916680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:19.319937944 CEST44349167188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:19.323308945 CEST49167443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:19.323327065 CEST44349167188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:19.483891964 CEST44349167188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:19.483980894 CEST44349167188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:19.484050035 CEST49167443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:19.484879017 CEST49167443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:19.512413025 CEST4916680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:19.519223928 CEST8049166132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:19.519284964 CEST4916680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:19.533699989 CEST4916880192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:19.539653063 CEST8049168132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:19.539835930 CEST4916880192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:19.539835930 CEST4916880192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:19.544944048 CEST8049168132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:20.220065117 CEST8049168132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:20.240541935 CEST49169443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:20.240597010 CEST44349169188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:20.240644932 CEST49169443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:20.241261005 CEST49169443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:20.241276026 CEST44349169188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:20.435710907 CEST8049168132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:20.435781002 CEST4916880192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:20.736223936 CEST44349169188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:20.739475012 CEST49169443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:20.739505053 CEST44349169188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:20.887140989 CEST44349169188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:20.887238026 CEST44349169188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:20.887291908 CEST49169443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:20.887993097 CEST49169443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:20.902853966 CEST4916880192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:20.908150911 CEST8049168132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:20.908220053 CEST4916880192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:20.926857948 CEST4917080192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:20.931720972 CEST8049170193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:20.931802988 CEST4917080192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:20.931922913 CEST4917080192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:20.936794043 CEST8049170193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:21.974586010 CEST8049170193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:22.142566919 CEST49171443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:22.142617941 CEST44349171188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:22.142683029 CEST49171443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:22.143558025 CEST49171443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:22.143579960 CEST44349171188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:22.187715054 CEST8049170193.122.6.168192.168.2.22
                  Jul 25, 2024 21:42:22.187783003 CEST4917080192.168.2.22193.122.6.168
                  Jul 25, 2024 21:42:22.647151947 CEST44349171188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:22.650954008 CEST49171443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:22.650978088 CEST44349171188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:22.783416033 CEST44349171188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:22.783512115 CEST44349171188.114.97.3192.168.2.22
                  Jul 25, 2024 21:42:22.783560038 CEST49171443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:22.784188986 CEST49171443192.168.2.22188.114.97.3
                  Jul 25, 2024 21:42:22.837749958 CEST4917280192.168.2.22158.101.44.242
                  Jul 25, 2024 21:42:22.843064070 CEST8049172158.101.44.242192.168.2.22
                  Jul 25, 2024 21:42:22.843132973 CEST4917280192.168.2.22158.101.44.242
                  Jul 25, 2024 21:42:22.843247890 CEST4917280192.168.2.22158.101.44.242
                  Jul 25, 2024 21:42:22.848088980 CEST8049172158.101.44.242192.168.2.22
                  Jul 25, 2024 21:42:23.447374105 CEST8049172158.101.44.242192.168.2.22
                  Jul 25, 2024 21:42:23.466932058 CEST49173443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:23.466974974 CEST44349173188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:23.467036009 CEST49173443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:23.467411995 CEST49173443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:23.467428923 CEST44349173188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:23.649802923 CEST4917280192.168.2.22158.101.44.242
                  Jul 25, 2024 21:42:24.045737982 CEST44349173188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:24.048949003 CEST49173443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:24.048960924 CEST44349173188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:24.209111929 CEST44349173188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:24.209208965 CEST44349173188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:24.209256887 CEST49173443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:24.210369110 CEST49173443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:24.230324030 CEST4917280192.168.2.22158.101.44.242
                  Jul 25, 2024 21:42:24.266019106 CEST8049172158.101.44.242192.168.2.22
                  Jul 25, 2024 21:42:24.266076088 CEST4917280192.168.2.22158.101.44.242
                  Jul 25, 2024 21:42:24.283560038 CEST4917480192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:24.298603058 CEST8049174132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:24.298760891 CEST4917480192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:24.312406063 CEST4917480192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:24.317821026 CEST8049174132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:25.064874887 CEST8049174132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:25.084002972 CEST49175443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:25.084043026 CEST44349175188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:25.084110975 CEST49175443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:25.084629059 CEST49175443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:25.084644079 CEST44349175188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:25.280013084 CEST8049174132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:25.280498981 CEST4917480192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:25.624857903 CEST44349175188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:25.628092051 CEST49175443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:25.628128052 CEST44349175188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:25.782778025 CEST44349175188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:25.783030987 CEST44349175188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:25.783157110 CEST49175443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:25.783792019 CEST49175443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:25.803637981 CEST4917480192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:25.812622070 CEST8049174132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:25.813975096 CEST4917480192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:25.870644093 CEST4917680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:25.877645016 CEST8049176132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:25.877708912 CEST4917680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:25.877856016 CEST4917680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:25.884310961 CEST8049176132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:26.575496912 CEST8049176132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:26.599314928 CEST49177443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:26.599350929 CEST44349177188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:26.599416971 CEST49177443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:26.599886894 CEST49177443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:26.599900007 CEST44349177188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:26.785427094 CEST4917680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:26.789128065 CEST8049176132.226.247.73192.168.2.22
                  Jul 25, 2024 21:42:26.789227009 CEST4917680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:42:27.060770035 CEST44349177188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:27.063942909 CEST49177443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:27.063961983 CEST44349177188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:27.248677969 CEST44349177188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:27.248776913 CEST44349177188.114.96.3192.168.2.22
                  Jul 25, 2024 21:42:27.248833895 CEST49177443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:42:27.249434948 CEST49177443192.168.2.22188.114.96.3
                  Jul 25, 2024 21:43:26.987341881 CEST8049170193.122.6.168192.168.2.22
                  Jul 25, 2024 21:43:26.987441063 CEST4917080192.168.2.22193.122.6.168
                  Jul 25, 2024 21:43:31.576649904 CEST8049176132.226.247.73192.168.2.22
                  Jul 25, 2024 21:43:31.580413103 CEST4917680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:44:06.594568968 CEST4917680192.168.2.22132.226.247.73
                  Jul 25, 2024 21:44:06.600161076 CEST8049176132.226.247.73192.168.2.22
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 25, 2024 21:42:13.434220076 CEST5456253192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:13.440557003 CEST53545628.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:13.448105097 CEST5291753192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:13.465953112 CEST53529178.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:16.239526987 CEST6275153192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:16.263606071 CEST53627518.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:17.967363119 CEST5789353192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:17.973793030 CEST53578938.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:17.976821899 CEST5482153192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:17.983134031 CEST53548218.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:18.765590906 CEST5471953192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:18.772747993 CEST53547198.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:19.518548965 CEST4988153192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:19.524874926 CEST53498818.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:19.527086020 CEST5499853192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:19.533334970 CEST53549988.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:20.228389025 CEST5278153192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:20.239881039 CEST53527818.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:20.910581112 CEST6392653192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:20.916973114 CEST53639268.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:20.919962883 CEST6551053192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:20.926317930 CEST53655108.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:22.133987904 CEST6267253192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:22.141249895 CEST53626728.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:22.804503918 CEST5647553192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:22.815371037 CEST53564758.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:22.815563917 CEST5647553192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:22.822289944 CEST53564758.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:22.829777002 CEST4938453192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:22.837045908 CEST53493848.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:23.454360008 CEST5484253192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:23.466296911 CEST53548428.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:24.238147974 CEST5810553192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:24.267976999 CEST53581058.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:24.271269083 CEST6492853192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:24.282867908 CEST53649288.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:25.072959900 CEST5739053192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:25.083312988 CEST53573908.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:25.811114073 CEST5809553192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:25.821685076 CEST53580958.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:25.860090971 CEST5426153192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:25.870014906 CEST53542618.8.8.8192.168.2.22
                  Jul 25, 2024 21:42:26.585875034 CEST6050753192.168.2.228.8.8.8
                  Jul 25, 2024 21:42:26.598676920 CEST53605078.8.8.8192.168.2.22
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jul 25, 2024 21:42:13.434220076 CEST192.168.2.228.8.8.80xbf71Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.448105097 CEST192.168.2.228.8.8.80x28abStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:16.239526987 CEST192.168.2.228.8.8.80x5cd4Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.967363119 CEST192.168.2.228.8.8.80x18d4Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.976821899 CEST192.168.2.228.8.8.80x505dStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:18.765590906 CEST192.168.2.228.8.8.80xe41cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.518548965 CEST192.168.2.228.8.8.80x2ebbStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.527086020 CEST192.168.2.228.8.8.80x517dStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.228389025 CEST192.168.2.228.8.8.80xa392Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.910581112 CEST192.168.2.228.8.8.80xeb74Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.919962883 CEST192.168.2.228.8.8.80xf694Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.133987904 CEST192.168.2.228.8.8.80x3d5fStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.804503918 CEST192.168.2.228.8.8.80x917fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.815563917 CEST192.168.2.228.8.8.80x917fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.829777002 CEST192.168.2.228.8.8.80xb01aStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:23.454360008 CEST192.168.2.228.8.8.80x3951Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.238147974 CEST192.168.2.228.8.8.80x5cbfStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.271269083 CEST192.168.2.228.8.8.80xf8a7Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.072959900 CEST192.168.2.228.8.8.80xb1b5Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.811114073 CEST192.168.2.228.8.8.80x5e2bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.860090971 CEST192.168.2.228.8.8.80xaa0Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:26.585875034 CEST192.168.2.228.8.8.80xbc01Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jul 25, 2024 21:42:13.440557003 CEST8.8.8.8192.168.2.220xbf71No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:13.440557003 CEST8.8.8.8192.168.2.220xbf71No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.440557003 CEST8.8.8.8192.168.2.220xbf71No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.440557003 CEST8.8.8.8192.168.2.220xbf71No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.440557003 CEST8.8.8.8192.168.2.220xbf71No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.440557003 CEST8.8.8.8192.168.2.220xbf71No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.465953112 CEST8.8.8.8192.168.2.220x28abNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:13.465953112 CEST8.8.8.8192.168.2.220x28abNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.465953112 CEST8.8.8.8192.168.2.220x28abNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.465953112 CEST8.8.8.8192.168.2.220x28abNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.465953112 CEST8.8.8.8192.168.2.220x28abNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:13.465953112 CEST8.8.8.8192.168.2.220x28abNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:16.263606071 CEST8.8.8.8192.168.2.220x5cd4No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:16.263606071 CEST8.8.8.8192.168.2.220x5cd4No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.973793030 CEST8.8.8.8192.168.2.220x18d4No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:17.973793030 CEST8.8.8.8192.168.2.220x18d4No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.973793030 CEST8.8.8.8192.168.2.220x18d4No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.973793030 CEST8.8.8.8192.168.2.220x18d4No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.973793030 CEST8.8.8.8192.168.2.220x18d4No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.973793030 CEST8.8.8.8192.168.2.220x18d4No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.983134031 CEST8.8.8.8192.168.2.220x505dNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:17.983134031 CEST8.8.8.8192.168.2.220x505dNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.983134031 CEST8.8.8.8192.168.2.220x505dNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.983134031 CEST8.8.8.8192.168.2.220x505dNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.983134031 CEST8.8.8.8192.168.2.220x505dNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:17.983134031 CEST8.8.8.8192.168.2.220x505dNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:18.772747993 CEST8.8.8.8192.168.2.220xe41cNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:18.772747993 CEST8.8.8.8192.168.2.220xe41cNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.524874926 CEST8.8.8.8192.168.2.220x2ebbNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:19.524874926 CEST8.8.8.8192.168.2.220x2ebbNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.524874926 CEST8.8.8.8192.168.2.220x2ebbNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.524874926 CEST8.8.8.8192.168.2.220x2ebbNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.524874926 CEST8.8.8.8192.168.2.220x2ebbNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.524874926 CEST8.8.8.8192.168.2.220x2ebbNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.533334970 CEST8.8.8.8192.168.2.220x517dNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:19.533334970 CEST8.8.8.8192.168.2.220x517dNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.533334970 CEST8.8.8.8192.168.2.220x517dNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.533334970 CEST8.8.8.8192.168.2.220x517dNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.533334970 CEST8.8.8.8192.168.2.220x517dNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:19.533334970 CEST8.8.8.8192.168.2.220x517dNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.239881039 CEST8.8.8.8192.168.2.220xa392No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.239881039 CEST8.8.8.8192.168.2.220xa392No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.916973114 CEST8.8.8.8192.168.2.220xeb74No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:20.916973114 CEST8.8.8.8192.168.2.220xeb74No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.916973114 CEST8.8.8.8192.168.2.220xeb74No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.916973114 CEST8.8.8.8192.168.2.220xeb74No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.916973114 CEST8.8.8.8192.168.2.220xeb74No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.916973114 CEST8.8.8.8192.168.2.220xeb74No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.926317930 CEST8.8.8.8192.168.2.220xf694No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:20.926317930 CEST8.8.8.8192.168.2.220xf694No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.926317930 CEST8.8.8.8192.168.2.220xf694No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.926317930 CEST8.8.8.8192.168.2.220xf694No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.926317930 CEST8.8.8.8192.168.2.220xf694No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:20.926317930 CEST8.8.8.8192.168.2.220xf694No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.141249895 CEST8.8.8.8192.168.2.220x3d5fNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.141249895 CEST8.8.8.8192.168.2.220x3d5fNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.815371037 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:22.815371037 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.815371037 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.815371037 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.815371037 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.815371037 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.822289944 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:22.822289944 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.822289944 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.822289944 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.822289944 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.822289944 CEST8.8.8.8192.168.2.220x917fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.837045908 CEST8.8.8.8192.168.2.220xb01aNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:22.837045908 CEST8.8.8.8192.168.2.220xb01aNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.837045908 CEST8.8.8.8192.168.2.220xb01aNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.837045908 CEST8.8.8.8192.168.2.220xb01aNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.837045908 CEST8.8.8.8192.168.2.220xb01aNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:22.837045908 CEST8.8.8.8192.168.2.220xb01aNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:23.466296911 CEST8.8.8.8192.168.2.220x3951No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:23.466296911 CEST8.8.8.8192.168.2.220x3951No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.267976999 CEST8.8.8.8192.168.2.220x5cbfNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:24.267976999 CEST8.8.8.8192.168.2.220x5cbfNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.267976999 CEST8.8.8.8192.168.2.220x5cbfNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.267976999 CEST8.8.8.8192.168.2.220x5cbfNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.267976999 CEST8.8.8.8192.168.2.220x5cbfNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.267976999 CEST8.8.8.8192.168.2.220x5cbfNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.282867908 CEST8.8.8.8192.168.2.220xf8a7No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:24.282867908 CEST8.8.8.8192.168.2.220xf8a7No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.282867908 CEST8.8.8.8192.168.2.220xf8a7No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.282867908 CEST8.8.8.8192.168.2.220xf8a7No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.282867908 CEST8.8.8.8192.168.2.220xf8a7No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:24.282867908 CEST8.8.8.8192.168.2.220xf8a7No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.083312988 CEST8.8.8.8192.168.2.220xb1b5No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.083312988 CEST8.8.8.8192.168.2.220xb1b5No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.821685076 CEST8.8.8.8192.168.2.220x5e2bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:25.821685076 CEST8.8.8.8192.168.2.220x5e2bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.821685076 CEST8.8.8.8192.168.2.220x5e2bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.821685076 CEST8.8.8.8192.168.2.220x5e2bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.821685076 CEST8.8.8.8192.168.2.220x5e2bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.821685076 CEST8.8.8.8192.168.2.220x5e2bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.870014906 CEST8.8.8.8192.168.2.220xaa0No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                  Jul 25, 2024 21:42:25.870014906 CEST8.8.8.8192.168.2.220xaa0No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.870014906 CEST8.8.8.8192.168.2.220xaa0No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.870014906 CEST8.8.8.8192.168.2.220xaa0No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.870014906 CEST8.8.8.8192.168.2.220xaa0No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:25.870014906 CEST8.8.8.8192.168.2.220xaa0No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:26.598676920 CEST8.8.8.8192.168.2.220xbc01No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                  Jul 25, 2024 21:42:26.598676920 CEST8.8.8.8192.168.2.220xbc01No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                  • reallyfreegeoip.org
                  • checkip.dyndns.org
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.2249163193.122.6.168801756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jul 25, 2024 21:42:13.480521917 CEST151OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Connection: Keep-Alive
                  Jul 25, 2024 21:42:15.572587013 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:15 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: fa582ba18eeab314d068f15ecc2d2229
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                  Jul 25, 2024 21:42:15.587784052 CEST127OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Jul 25, 2024 21:42:16.195331097 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:16 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 47d33777f44aa25b0d139a0ba4fcd151
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                  Jul 25, 2024 21:42:16.403691053 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:16 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 47d33777f44aa25b0d139a0ba4fcd151
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                  Jul 25, 2024 21:42:16.999799967 CEST127OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Jul 25, 2024 21:42:17.191009998 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:17 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: a4b3a936b226f80217a292631c1536b9
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.2249166132.226.247.73801756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jul 25, 2024 21:42:17.988842964 CEST127OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Jul 25, 2024 21:42:18.754221916 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:18 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 395ecaa25c2d5d470ff81c7388686517
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.2249168132.226.247.73801756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jul 25, 2024 21:42:19.539835930 CEST127OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Jul 25, 2024 21:42:20.220065117 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:20 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 9fc0ea4b4a3195cdb0817e9889777ecf
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                  Jul 25, 2024 21:42:20.435710907 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:20 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 9fc0ea4b4a3195cdb0817e9889777ecf
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.2249170193.122.6.168801756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jul 25, 2024 21:42:20.931922913 CEST127OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Jul 25, 2024 21:42:21.974586010 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:21 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 1956aa0c618c7569445d4ea0e9d63cb2
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                  Jul 25, 2024 21:42:22.187715054 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:21 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 1956aa0c618c7569445d4ea0e9d63cb2
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.2249172158.101.44.242801756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jul 25, 2024 21:42:22.843247890 CEST151OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Connection: Keep-Alive
                  Jul 25, 2024 21:42:23.447374105 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:23 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: 2c0c02b3b889ce3fb34fd10e68a7751a
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  5192.168.2.2249174132.226.247.73801756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jul 25, 2024 21:42:24.312406063 CEST151OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Connection: Keep-Alive
                  Jul 25, 2024 21:42:25.064874887 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:24 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: fa6e4d2a97423bd47bca8c7224b152ac
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                  Jul 25, 2024 21:42:25.280013084 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:24 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: fa6e4d2a97423bd47bca8c7224b152ac
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  6192.168.2.2249176132.226.247.73801756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jul 25, 2024 21:42:25.877856016 CEST151OUTGET / HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                  Host: checkip.dyndns.org
                  Connection: Keep-Alive
                  Jul 25, 2024 21:42:26.575496912 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:26 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: e4aa36ff6c8e95f271067335ac428424
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                  Jul 25, 2024 21:42:26.789128065 CEST320INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:26 GMT
                  Content-Type: text/html
                  Content-Length: 103
                  Connection: keep-alive
                  Cache-Control: no-cache
                  Pragma: no-cache
                  X-Request-ID: e4aa36ff6c8e95f271067335ac428424
                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.2249164188.114.97.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:16 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  Connection: Keep-Alive
                  2024-07-25 19:42:16 UTC708INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:16 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65259
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D6cUCn%2B4YUOZw6HVENSvH3FZIboLja3ndrH56AaWWOOtbG2iZmyeIQUlTpzVwR4u%2FEItpOZdjNBHEp0YT%2FJPllRK5Vmp05tjZyMJcGx4upBi7YHahkw3EIZiRaBvlBeS7D%2B3ksmc"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea1dbaaad7c9f-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:16 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:16 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.2249165188.114.97.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:17 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  2024-07-25 19:42:17 UTC714INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:17 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65260
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IT5uocCZWb%2Bb2sexG%2FBnHi0oPs2ObkUo5%2BGMdtd990We2%2FCih3f5JlLfphXXqrV1GJFCX2fslob0CKs6f%2F%2FQz%2BvNgoei6FBnkT91tT6jQOqAqWnPGCtY7fx36lLRrQ0UrDDluTjs"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea1e1b9098c60-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:17 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:17 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.2249167188.114.96.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:19 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  2024-07-25 19:42:19 UTC708INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:19 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65262
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=64bx5jAN%2FpONDKKLs2uxsIapHshp1T11c4c2qPZLTmMjJBemP2u%2BAMnUBEsU3lW3r0%2FFSgyOD%2FZmKVMQdZXqlxirjwqzLWsKzesabdVlkr7htLUca2aWp8EBQ1oKzkg7j1PlPx4b"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea1eb3bec434f-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:19 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:19 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.2249169188.114.96.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:20 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  Connection: Keep-Alive
                  2024-07-25 19:42:20 UTC702INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:20 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65263
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8d7UdUbe12tI8zyhATZZliKng9tHop96Ucz%2Fa1rVS3WSslcC8G8nVWQKPIWgs9PFEwZ5Jv4ZUQXuE2i26nwYfLESCh6BSw0b4Pu6dxdS7YPNNisnwafamfH0Lf924vJqT0gS8NzM"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea1f42d84c411-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:20 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:20 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.2249171188.114.97.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:22 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  2024-07-25 19:42:22 UTC710INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:22 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65265
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9MbMAB42BxY%2FOd1HhHOcZAfCKAGzRTwTdZbz12YJ4zXEWVdycQl5S1t9xaDFS9%2FCz3PWQYTRb9HnM1prr%2BUvmV%2Bl4mm6qiY4wGInMuEU8WjTyBp06xpjBuhrEU1Ri%2Fhkcg1Sqk5c"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea1fffecb6a56-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:22 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:22 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  5192.168.2.2249173188.114.96.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:24 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  2024-07-25 19:42:24 UTC708INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:24 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65267
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y6hAGBpPNVS%2ButkTiVvLyLaCfYOBAvUxwGOSkpm7G9XF8awTAoeaB8VCx2qR8JuZQ2G0vgBVDw6x9xgAxaj12WuLcJqxDO4JMKnLCnSHP85GWEbK4LXO3rd36%2B%2FoZZb6S5IZ%2Febf"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea208a80c42b0-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:24 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  6192.168.2.2249175188.114.96.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:25 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  Connection: Keep-Alive
                  2024-07-25 19:42:25 UTC708INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:25 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65268
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oZ2I%2BTGxz%2BXEzHvINUDoCu%2B5XzSKc9JxWkVyWJ1nLAAUBytcmrXafbvDzPCdpxTB68lN4tGEuqbzYeTsMuCwDb4WBfhcCow3h3BCFdbOaGx3J8R%2FEF6wa2dC3VWFA9Umjqu9Kyi2"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea212bb885e6a-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:25 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  7192.168.2.2249177188.114.96.34431756C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  2024-07-25 19:42:27 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                  Host: reallyfreegeoip.org
                  2024-07-25 19:42:27 UTC708INHTTP/1.1 200 OK
                  Date: Thu, 25 Jul 2024 19:42:27 GMT
                  Content-Type: application/xml
                  Transfer-Encoding: chunked
                  Connection: close
                  access-control-allow-origin: *
                  vary: Accept-Encoding
                  Cache-Control: max-age=86400
                  CF-Cache-Status: HIT
                  Age: 65270
                  Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jbUchIO8vgVHAhJ4n%2FjFSwxJOh8Y9IeeIU%2Buthkmo6j2LDXoud2BEwyFT%2F5YhT1JPN%2FiPnwy7gZV2lGPjFkhBu6cPBWxRypOBvq2etj43Y7MFwgLoizLGVQlCAtDZei0Ogs6SXWT"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8a8ea21bbbde7c9a-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-25 19:42:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                  2024-07-25 19:42:27 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:15:42:10
                  Start date:25/07/2024
                  Path:C:\Users\user\Desktop\New order.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\New order.exe"
                  Imagebase:0xda0000
                  File size:1'055'232 bytes
                  MD5 hash:D69BE8DA083A01D8E8DBBCAAE09508BB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                  • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.354982741.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:15:42:11
                  Start date:25/07/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\New order.exe"
                  Imagebase:0x9f0000
                  File size:45'248 bytes
                  MD5 hash:19855C0DC5BEC9FDF925307C57F9F5FC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.882370634.000000000251C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.882246076.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.882370634.0000000002371000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.5%
                    Dynamic/Decrypted Code Coverage:1.3%
                    Signature Coverage:5.1%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:88
                    execution_graph 96597 dd2f1d 96599 dd2f28 96597->96599 96600 dd2f51 96599->96600 96601 dd2f4d 96599->96601 96603 dd3405 96599->96603 96610 dd2f75 DeleteCriticalSection 96600->96610 96611 dd2fd7 96603->96611 96606 dd344a InitializeCriticalSectionAndSpinCount 96607 dd3435 96606->96607 96618 dc0a8c 96607->96618 96609 dd3461 96609->96599 96610->96601 96612 dd3007 96611->96612 96615 dd3003 96611->96615 96612->96606 96612->96607 96613 dd3027 96613->96612 96616 dd3033 GetProcAddress 96613->96616 96615->96612 96615->96613 96625 dd3073 96615->96625 96617 dd3043 __crt_fast_encode_pointer 96616->96617 96617->96612 96619 dc0a95 96618->96619 96620 dc0a97 IsProcessorFeaturePresent 96618->96620 96619->96609 96622 dc0c5d 96620->96622 96632 dc0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96622->96632 96624 dc0d40 96624->96609 96626 dd3094 LoadLibraryExW 96625->96626 96630 dd3089 96625->96630 96627 dd30b1 GetLastError 96626->96627 96631 dd30c9 96626->96631 96628 dd30bc LoadLibraryExW 96627->96628 96627->96631 96628->96631 96629 dd30e0 FreeLibrary 96629->96630 96630->96615 96631->96629 96631->96630 96632->96624 98934 dd2e7d 98942 dd3162 98934->98942 98938 dd2e99 98939 dd2ea6 98938->98939 98950 dd2ea9 11 API calls 98938->98950 98941 dd2e91 98943 dd2fd7 _free 5 API calls 98942->98943 98944 dd3189 98943->98944 98945 dd31a1 TlsAlloc 98944->98945 98946 dd3192 98944->98946 98945->98946 98947 dc0a8c CatchGuardHandler 5 API calls 98946->98947 98948 dd2e87 98947->98948 98948->98941 98949 dd2df8 20 API calls _free 98948->98949 98949->98938 98950->98941 96633 da105b 96638 da344d 96633->96638 96635 da106a 96669 dc00a3 29 API calls __onexit 96635->96669 96637 da1074 96639 da345d __wsopen_s 96638->96639 96670 daa961 96639->96670 96643 da351c 96682 da3357 96643->96682 96650 daa961 22 API calls 96651 da354d 96650->96651 96703 daa6c3 96651->96703 96654 de3176 RegQueryValueExW 96655 de320c RegCloseKey 96654->96655 96656 de3193 96654->96656 96657 de321e _wcslen 96655->96657 96659 da3578 96655->96659 96709 dbfe0b 96656->96709 96657->96659 96667 da515f 22 API calls 96657->96667 96668 da4c6d 22 API calls 96657->96668 96734 da9cb3 96657->96734 96659->96635 96667->96657 96668->96657 96669->96637 96671 dbfe0b 22 API calls 96670->96671 96672 daa976 96671->96672 96740 dbfddb 96672->96740 96674 da3513 96675 da3a5a 96674->96675 96762 de1f50 96675->96762 96678 da9cb3 22 API calls 96679 da3a8d 96678->96679 96764 da3aa2 96679->96764 96681 da3a97 96681->96643 96683 de1f50 __wsopen_s 96682->96683 96684 da3364 GetFullPathNameW 96683->96684 96685 da3386 96684->96685 96686 da6b57 22 API calls 96685->96686 96687 da33a4 96686->96687 96688 da33c6 96687->96688 96689 de30bb 96688->96689 96690 da33dd 96688->96690 96692 dbfddb 22 API calls 96689->96692 96788 da33ee 96690->96788 96694 de30c5 _wcslen 96692->96694 96693 da33e8 96697 da515f 96693->96697 96695 dbfe0b 22 API calls 96694->96695 96696 de30fe __fread_nolock 96695->96696 96698 da516e 96697->96698 96702 da518f __fread_nolock 96697->96702 96700 dbfe0b 22 API calls 96698->96700 96699 dbfddb 22 API calls 96701 da3544 96699->96701 96700->96702 96701->96650 96702->96699 96704 daa6dd 96703->96704 96705 da3556 RegOpenKeyExW 96703->96705 96706 dbfddb 22 API calls 96704->96706 96705->96654 96705->96659 96707 daa6e7 96706->96707 96708 dbfe0b 22 API calls 96707->96708 96708->96705 96711 dbfddb 96709->96711 96743 dbfde0 96740->96743 96742 dbfdfa 96742->96674 96743->96742 96746 dbfdfc 96743->96746 96750 dcea0c 96743->96750 96757 dc4ead 7 API calls 2 library calls 96743->96757 96745 dc066d 96759 dc32a4 RaiseException 96745->96759 96746->96745 96758 dc32a4 RaiseException 96746->96758 96748 dc068a 96748->96674 96755 dd3820 _free 96750->96755 96751 dd385e 96761 dcf2d9 20 API calls _free 96751->96761 96753 dd3849 RtlAllocateHeap 96754 dd385c 96753->96754 96753->96755 96754->96743 96755->96751 96755->96753 96760 dc4ead 7 API calls 2 library calls 96755->96760 96757->96743 96758->96745 96759->96748 96760->96755 96761->96754 96763 da3a67 GetModuleFileNameW 96762->96763 96763->96678 96765 de1f50 __wsopen_s 96764->96765 96766 da3aaf GetFullPathNameW 96765->96766 96767 da3ae9 96766->96767 96768 da3ace 96766->96768 96770 daa6c3 22 API calls 96767->96770 96769 da6b57 22 API calls 96768->96769 96771 da3ada 96769->96771 96770->96771 96774 da37a0 96771->96774 96775 da37ae 96774->96775 96778 da93b2 96775->96778 96777 da37c2 96777->96681 96779 da93c0 96778->96779 96781 da93c9 __fread_nolock 96778->96781 96779->96781 96782 daaec9 96779->96782 96781->96777 96783 daaed9 __fread_nolock 96782->96783 96784 daaedc 96782->96784 96783->96781 96785 dbfddb 22 API calls 96784->96785 96786 daaee7 96785->96786 96787 dbfe0b 22 API calls 96786->96787 96787->96783 96789 da33fe _wcslen 96788->96789 96790 de311d 96789->96790 96791 da3411 96789->96791 96792 dbfddb 22 API calls 96790->96792 96798 daa587 96791->96798 96794 de3127 96792->96794 96796 dbfe0b 22 API calls 96794->96796 96795 da341e __fread_nolock 96795->96693 96797 de3157 __fread_nolock 96796->96797 96799 daa59d 96798->96799 96801 daa598 __fread_nolock 96798->96801 96800 dbfe0b 22 API calls 96799->96800 96802 def80f 96799->96802 96800->96801 96801->96795 96802->96802 98951 ddcabc 98952 ddcac5 98951->98952 98953 ddcace 98951->98953 98955 ddc9bb 98952->98955 98956 dd2d74 _abort 38 API calls 98955->98956 98957 ddc9c8 98956->98957 98975 ddcada 98957->98975 98959 ddc9d0 98984 ddc74f 98959->98984 98962 ddc9e7 98962->98953 98963 dd3820 __fread_nolock 21 API calls 98964 ddc9f8 98963->98964 98974 ddca2a 98964->98974 98991 ddcb7c 98964->98991 98967 dd29c8 _free 20 API calls 98967->98962 98968 ddca25 99001 dcf2d9 20 API calls _free 98968->99001 98970 ddca42 98971 ddca6e 98970->98971 98972 dd29c8 _free 20 API calls 98970->98972 98971->98974 99002 ddc625 26 API calls 98971->99002 98972->98971 98974->98967 98976 ddcae6 ___scrt_is_nonwritable_in_current_image 98975->98976 98977 dd2d74 _abort 38 API calls 98976->98977 98982 ddcaf0 98977->98982 98979 ddcb74 __fread_nolock 98979->98959 98982->98979 98983 dd29c8 _free 20 API calls 98982->98983 99003 dd28a7 38 API calls _abort 98982->99003 99004 dd2f5e EnterCriticalSection 98982->99004 99005 ddcb6b LeaveCriticalSection _abort 98982->99005 98983->98982 99006 dc49a5 98984->99006 98987 ddc770 GetOEMCP 98989 ddc799 98987->98989 98988 ddc782 98988->98989 98990 ddc787 GetACP 98988->98990 98989->98962 98989->98963 98990->98989 98992 ddc74f 40 API calls 98991->98992 98993 ddcb9b 98992->98993 98996 ddcbec IsValidCodePage 98993->98996 98998 ddcba2 98993->98998 99000 ddcc11 ___scrt_fastfail 98993->99000 98994 dc0a8c CatchGuardHandler 5 API calls 98995 ddca1d 98994->98995 98995->98968 98995->98970 98997 ddcbfe GetCPInfo 98996->98997 98996->98998 98997->98998 98997->99000 98998->98994 99016 ddc827 GetCPInfo 99000->99016 99001->98974 99002->98974 99004->98982 99005->98982 99007 dc49b8 99006->99007 99008 dc49c2 99006->99008 99007->98987 99007->98988 99008->99007 99009 dd2d74 _abort 38 API calls 99008->99009 99010 dc49e3 99009->99010 99014 dd2ec3 38 API calls _strftime 99010->99014 99012 dc49fc 99015 dd2ef0 38 API calls _strftime 99012->99015 99014->99012 99015->99007 99020 ddc861 99016->99020 99025 ddc90b 99016->99025 99019 dc0a8c CatchGuardHandler 5 API calls 99022 ddc9b7 99019->99022 99026 ddd8c3 99020->99026 99022->98998 99024 dd641b 43 API calls 99024->99025 99025->99019 99027 dc49a5 _strftime 38 API calls 99026->99027 99028 ddd8e3 MultiByteToWideChar 99027->99028 99030 ddd9b9 99028->99030 99031 ddd921 99028->99031 99032 dc0a8c CatchGuardHandler 5 API calls 99030->99032 99033 dd3820 __fread_nolock 21 API calls 99031->99033 99036 ddd942 _strftime ___scrt_fastfail 99031->99036 99034 ddc8c2 99032->99034 99033->99036 99040 dd641b 99034->99040 99035 ddd9b3 99045 dd1537 20 API calls _free 99035->99045 99036->99035 99038 ddd987 MultiByteToWideChar 99036->99038 99038->99035 99039 ddd9a3 GetStringTypeW 99038->99039 99039->99035 99041 dc49a5 _strftime 38 API calls 99040->99041 99042 dd642e 99041->99042 99046 dd61fe 99042->99046 99045->99030 99047 dd6219 99046->99047 99048 dd623f MultiByteToWideChar 99047->99048 99049 dd6269 99048->99049 99058 dd63f3 99048->99058 99052 dd628a _strftime 99049->99052 99053 dd3820 __fread_nolock 21 API calls 99049->99053 99050 dc0a8c CatchGuardHandler 5 API calls 99051 dd6406 99050->99051 99051->99024 99054 dd62d3 MultiByteToWideChar 99052->99054 99069 dd633f 99052->99069 99053->99052 99055 dd62ec 99054->99055 99054->99069 99073 dd3467 99055->99073 99058->99050 99060 dd634e 99064 dd3820 __fread_nolock 21 API calls 99060->99064 99067 dd636f _strftime 99060->99067 99061 dd6316 99062 dd3467 _strftime 11 API calls 99061->99062 99061->99069 99062->99069 99063 dd63e4 99081 dd1537 20 API calls _free 99063->99081 99064->99067 99065 dd3467 _strftime 11 API calls 99068 dd63c3 99065->99068 99067->99063 99067->99065 99068->99063 99070 dd63d2 WideCharToMultiByte 99068->99070 99082 dd1537 20 API calls _free 99069->99082 99070->99063 99071 dd6412 99070->99071 99083 dd1537 20 API calls _free 99071->99083 99074 dd2fd7 _free 5 API calls 99073->99074 99075 dd348e 99074->99075 99076 dd3497 99075->99076 99084 dd34ef 10 API calls 3 library calls 99075->99084 99079 dc0a8c CatchGuardHandler 5 API calls 99076->99079 99078 dd34d7 LCMapStringW 99078->99076 99080 dd34e9 99079->99080 99080->99060 99080->99061 99080->99069 99081->99069 99082->99058 99083->99069 99084->99078 96807 da1098 96812 da42de 96807->96812 96811 da10a7 96813 daa961 22 API calls 96812->96813 96814 da42f5 GetVersionExW 96813->96814 96815 da6b57 22 API calls 96814->96815 96816 da4342 96815->96816 96817 da93b2 22 API calls 96816->96817 96829 da4378 96816->96829 96818 da436c 96817->96818 96820 da37a0 22 API calls 96818->96820 96819 da441b GetCurrentProcess IsWow64Process 96821 da4437 96819->96821 96820->96829 96822 da444f LoadLibraryA 96821->96822 96823 de3824 GetSystemInfo 96821->96823 96824 da449c GetSystemInfo 96822->96824 96825 da4460 GetProcAddress 96822->96825 96828 da4476 96824->96828 96825->96824 96827 da4470 GetNativeSystemInfo 96825->96827 96826 de37df 96827->96828 96830 da447a FreeLibrary 96828->96830 96831 da109d 96828->96831 96829->96819 96829->96826 96830->96831 96832 dc00a3 29 API calls __onexit 96831->96832 96832->96811 99085 daf7bf 99086 daf7d3 99085->99086 99087 dafcb6 99085->99087 99088 dafcc2 99086->99088 99090 dbfddb 22 API calls 99086->99090 99122 daaceb 23 API calls messages 99087->99122 99123 daaceb 23 API calls messages 99088->99123 99092 daf7e5 99090->99092 99092->99088 99093 daf83e 99092->99093 99094 dafd3d 99092->99094 99096 db1310 256 API calls 99093->99096 99112 daed9d messages 99093->99112 99124 e11155 22 API calls 99094->99124 99118 daec76 messages 99096->99118 99097 dafef7 99106 daa8c7 22 API calls 99097->99106 99097->99112 99099 dbfddb 22 API calls 99099->99118 99101 df4b0b 99126 e1359c 82 API calls __wsopen_s 99101->99126 99102 daa8c7 22 API calls 99102->99118 99103 df4600 99108 daa8c7 22 API calls 99103->99108 99103->99112 99106->99112 99107 dc0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 99107->99118 99108->99112 99110 dafbe3 99110->99112 99113 df4bdc 99110->99113 99119 daf3ae messages 99110->99119 99111 daa961 22 API calls 99111->99118 99127 e1359c 82 API calls __wsopen_s 99113->99127 99115 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 99115->99118 99116 df4beb 99128 e1359c 82 API calls __wsopen_s 99116->99128 99117 dc00a3 29 API calls pre_c_initialization 99117->99118 99118->99097 99118->99099 99118->99101 99118->99102 99118->99103 99118->99107 99118->99110 99118->99111 99118->99112 99118->99115 99118->99116 99118->99117 99118->99119 99120 db01e0 256 API calls 2 library calls 99118->99120 99121 db06a0 41 API calls messages 99118->99121 99119->99112 99125 e1359c 82 API calls __wsopen_s 99119->99125 99120->99118 99121->99118 99122->99088 99123->99094 99124->99112 99125->99112 99126->99112 99127->99116 99128->99112 99129 1623b0 99130 160000 GetPEB 99129->99130 99131 16244e 99130->99131 99143 1622a0 99131->99143 99144 1622a9 Sleep 99143->99144 99145 1622b7 99144->99145 99146 dd90fa 99147 dd9107 99146->99147 99150 dd911f 99146->99150 99196 dcf2d9 20 API calls _free 99147->99196 99149 dd910c 99197 dd27ec 26 API calls _strftime 99149->99197 99152 dd917a 99150->99152 99160 dd9117 99150->99160 99198 ddfdc4 21 API calls 2 library calls 99150->99198 99154 dcd955 __fread_nolock 26 API calls 99152->99154 99155 dd9192 99154->99155 99166 dd8c32 99155->99166 99157 dd9199 99158 dcd955 __fread_nolock 26 API calls 99157->99158 99157->99160 99159 dd91c5 99158->99159 99159->99160 99161 dcd955 __fread_nolock 26 API calls 99159->99161 99162 dd91d3 99161->99162 99162->99160 99163 dcd955 __fread_nolock 26 API calls 99162->99163 99164 dd91e3 99163->99164 99165 dcd955 __fread_nolock 26 API calls 99164->99165 99165->99160 99167 dd8c3e ___scrt_is_nonwritable_in_current_image 99166->99167 99168 dd8c5e 99167->99168 99169 dd8c46 99167->99169 99170 dd8d24 99168->99170 99175 dd8c97 99168->99175 99200 dcf2c6 20 API calls _free 99169->99200 99207 dcf2c6 20 API calls _free 99170->99207 99173 dd8c4b 99201 dcf2d9 20 API calls _free 99173->99201 99178 dd8cbb 99175->99178 99179 dd8ca6 99175->99179 99176 dd8d29 99208 dcf2d9 20 API calls _free 99176->99208 99177 dd8c53 __fread_nolock 99177->99157 99199 dd5147 EnterCriticalSection 99178->99199 99202 dcf2c6 20 API calls _free 99179->99202 99183 dd8cab 99203 dcf2d9 20 API calls _free 99183->99203 99184 dd8cc1 99186 dd8cdd 99184->99186 99187 dd8cf2 99184->99187 99204 dcf2d9 20 API calls _free 99186->99204 99189 dd8d45 __fread_nolock 38 API calls 99187->99189 99193 dd8ced 99189->99193 99190 dd8cb3 99209 dd27ec 26 API calls _strftime 99190->99209 99192 dd8ce2 99205 dcf2c6 20 API calls _free 99192->99205 99206 dd8d1c LeaveCriticalSection __wsopen_s 99193->99206 99196->99149 99197->99160 99198->99152 99199->99184 99200->99173 99201->99177 99202->99183 99203->99190 99204->99192 99205->99193 99206->99177 99207->99176 99208->99190 99209->99177 99210 dc03fb 99211 dc0407 ___scrt_is_nonwritable_in_current_image 99210->99211 99239 dbfeb1 99211->99239 99213 dc040e 99214 dc0561 99213->99214 99218 dc0438 99213->99218 99266 dc083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 99214->99266 99216 dc0568 99267 dc4e52 28 API calls _abort 99216->99267 99228 dc0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 99218->99228 99250 dd247d 99218->99250 99219 dc056e 99268 dc4e04 28 API calls _abort 99219->99268 99223 dc0576 99224 dc0457 99226 dc04d8 99258 dc0959 99226->99258 99228->99226 99262 dc4e1a 38 API calls 2 library calls 99228->99262 99230 dc04de 99231 dc04f3 99230->99231 99263 dc0992 GetModuleHandleW 99231->99263 99233 dc04fa 99233->99216 99234 dc04fe 99233->99234 99235 dc0507 99234->99235 99264 dc4df5 28 API calls _abort 99234->99264 99265 dc0040 13 API calls 2 library calls 99235->99265 99238 dc050f 99238->99224 99240 dbfeba 99239->99240 99269 dc0698 IsProcessorFeaturePresent 99240->99269 99242 dbfec6 99270 dc2c94 99242->99270 99244 dbfecb 99245 dbfecf 99244->99245 99279 dd2317 99244->99279 99245->99213 99248 dbfee6 99248->99213 99251 dd2494 99250->99251 99252 dc0a8c CatchGuardHandler 5 API calls 99251->99252 99253 dc0451 99252->99253 99253->99224 99254 dd2421 99253->99254 99256 dd2450 99254->99256 99255 dc0a8c CatchGuardHandler 5 API calls 99257 dd2479 99255->99257 99256->99255 99257->99228 99329 dc2340 99258->99329 99260 dc096c GetStartupInfoW 99261 dc097f 99260->99261 99261->99230 99262->99226 99263->99233 99264->99235 99265->99238 99266->99216 99267->99219 99268->99223 99269->99242 99271 dc2c99 ___vcrt_initialize_winapi_thunks 99270->99271 99283 dc3462 99271->99283 99275 dc2cba 99275->99244 99276 dc2caf 99276->99275 99297 dc349e DeleteCriticalSection 99276->99297 99278 dc2ca7 99278->99244 99325 ddd1f6 99279->99325 99282 dc2cbd 8 API calls 3 library calls 99282->99245 99284 dc346b 99283->99284 99286 dc3494 99284->99286 99287 dc2ca3 99284->99287 99298 dc36ef 99284->99298 99303 dc349e DeleteCriticalSection 99286->99303 99287->99278 99289 dc3414 99287->99289 99318 dc3600 99289->99318 99292 dc3429 99292->99276 99294 dc3437 99295 dc3444 99294->99295 99324 dc3447 6 API calls ___vcrt_FlsFree 99294->99324 99295->99276 99297->99278 99304 dc3591 99298->99304 99300 dc3709 99301 dc3727 InitializeCriticalSectionAndSpinCount 99300->99301 99302 dc3712 99300->99302 99301->99302 99302->99284 99303->99287 99305 dc35b9 99304->99305 99306 dc35b5 __crt_fast_encode_pointer 99304->99306 99305->99306 99311 dc34cd 99305->99311 99306->99300 99309 dc35d3 GetProcAddress 99309->99306 99310 dc35e3 __crt_fast_encode_pointer 99309->99310 99310->99306 99312 dc34dc try_get_first_available_module 99311->99312 99313 dc34f9 LoadLibraryExW 99312->99313 99315 dc356f FreeLibrary 99312->99315 99316 dc3586 99312->99316 99317 dc3547 LoadLibraryExW 99312->99317 99313->99312 99314 dc3514 GetLastError 99313->99314 99314->99312 99315->99312 99316->99306 99316->99309 99317->99312 99319 dc3591 try_get_function 5 API calls 99318->99319 99320 dc361a 99319->99320 99321 dc3633 TlsAlloc 99320->99321 99322 dc341e 99320->99322 99322->99292 99323 dc36b1 6 API calls try_get_function 99322->99323 99323->99294 99324->99292 99328 ddd20f 99325->99328 99326 dc0a8c CatchGuardHandler 5 API calls 99327 dbfed8 99326->99327 99327->99248 99327->99282 99328->99326 99329->99260 99330 da1033 99335 da4c91 99330->99335 99334 da1042 99336 daa961 22 API calls 99335->99336 99337 da4cff 99336->99337 99343 da3af0 99337->99343 99340 da4d9c 99341 da1038 99340->99341 99346 da51f7 22 API calls __fread_nolock 99340->99346 99342 dc00a3 29 API calls __onexit 99341->99342 99342->99334 99347 da3b1c 99343->99347 99346->99340 99348 da3b0f 99347->99348 99349 da3b29 99347->99349 99348->99340 99349->99348 99350 da3b30 RegOpenKeyExW 99349->99350 99350->99348 99351 da3b4a RegQueryValueExW 99350->99351 99352 da3b80 RegCloseKey 99351->99352 99353 da3b6b 99351->99353 99352->99348 99353->99352 96833 dadf10 96836 dab710 96833->96836 96837 dab72b 96836->96837 96838 df00f8 96837->96838 96839 df0146 96837->96839 96862 dab750 96837->96862 96842 df0102 96838->96842 96845 df010f 96838->96845 96838->96862 96902 e258a2 256 API calls 2 library calls 96839->96902 96900 e25d33 256 API calls 96842->96900 96863 daba20 96845->96863 96901 e261d0 256 API calls 2 library calls 96845->96901 96848 df03d9 96848->96848 96850 dbd336 40 API calls 96850->96862 96852 daba4e 96854 df0322 96909 e25c0c 82 API calls 96854->96909 96861 dabbe0 40 API calls 96861->96862 96862->96850 96862->96852 96862->96854 96862->96861 96862->96863 96867 daec40 96862->96867 96891 daa81b 41 API calls 96862->96891 96892 dbd2f0 40 API calls 96862->96892 96893 dba01b 256 API calls 96862->96893 96894 dc0242 5 API calls __Init_thread_wait 96862->96894 96895 dbedcd 22 API calls 96862->96895 96896 dc00a3 29 API calls __onexit 96862->96896 96897 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96862->96897 96898 dbee53 82 API calls 96862->96898 96899 dbe5ca 256 API calls 96862->96899 96903 daaceb 23 API calls messages 96862->96903 96904 dff6bf 23 API calls 96862->96904 96905 daa8c7 96862->96905 96863->96852 96910 e1359c 82 API calls __wsopen_s 96863->96910 96885 daec76 messages 96867->96885 96868 dbfddb 22 API calls 96868->96885 96869 dc0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96869->96885 96870 dafef7 96878 daa8c7 22 API calls 96870->96878 96883 daed9d messages 96870->96883 96873 df4b0b 96914 e1359c 82 API calls __wsopen_s 96873->96914 96874 daa8c7 22 API calls 96874->96885 96875 df4600 96879 daa8c7 22 API calls 96875->96879 96875->96883 96878->96883 96879->96883 96881 dafbe3 96881->96883 96884 df4bdc 96881->96884 96890 daf3ae messages 96881->96890 96882 daa961 22 API calls 96882->96885 96883->96862 96915 e1359c 82 API calls __wsopen_s 96884->96915 96885->96868 96885->96869 96885->96870 96885->96873 96885->96874 96885->96875 96885->96881 96885->96882 96885->96883 96887 dc00a3 29 API calls pre_c_initialization 96885->96887 96888 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96885->96888 96889 df4beb 96885->96889 96885->96890 96911 db01e0 256 API calls 2 library calls 96885->96911 96912 db06a0 41 API calls messages 96885->96912 96887->96885 96888->96885 96916 e1359c 82 API calls __wsopen_s 96889->96916 96890->96883 96913 e1359c 82 API calls __wsopen_s 96890->96913 96891->96862 96892->96862 96893->96862 96894->96862 96895->96862 96896->96862 96897->96862 96898->96862 96899->96862 96900->96845 96901->96863 96902->96862 96903->96862 96904->96862 96906 daa8db 96905->96906 96908 daa8ea __fread_nolock 96905->96908 96907 dbfe0b 22 API calls 96906->96907 96906->96908 96907->96908 96908->96862 96909->96863 96910->96848 96911->96885 96912->96885 96913->96883 96914->96883 96915->96889 96916->96883 99354 df3f75 99365 dbceb1 99354->99365 99356 df3f8b 99357 df4006 99356->99357 99374 dbe300 23 API calls 99356->99374 99361 dabf40 256 API calls 99357->99361 99359 df4052 99363 df4a88 99359->99363 99376 e1359c 82 API calls __wsopen_s 99359->99376 99360 df3fe6 99360->99359 99375 e11abf 22 API calls 99360->99375 99361->99359 99366 dbcebf 99365->99366 99367 dbced2 99365->99367 99377 daaceb 23 API calls messages 99366->99377 99368 dbced7 99367->99368 99369 dbcf05 99367->99369 99371 dbfddb 22 API calls 99368->99371 99378 daaceb 23 API calls messages 99369->99378 99373 dbcec9 99371->99373 99373->99356 99374->99360 99375->99357 99376->99363 99377->99373 99378->99373 96917 da3156 96920 da3170 96917->96920 96921 da3187 96920->96921 96922 da31eb 96921->96922 96923 da318c 96921->96923 96958 da31e9 96921->96958 96927 de2dfb 96922->96927 96928 da31f1 96922->96928 96924 da3199 96923->96924 96925 da3265 PostQuitMessage 96923->96925 96930 de2e7c 96924->96930 96931 da31a4 96924->96931 96961 da316a 96925->96961 96926 da31d0 DefWindowProcW 96926->96961 96969 da18e2 10 API calls 96927->96969 96932 da31f8 96928->96932 96933 da321d SetTimer RegisterWindowMessageW 96928->96933 96975 e0bf30 34 API calls ___scrt_fastfail 96930->96975 96937 da31ae 96931->96937 96938 de2e68 96931->96938 96934 de2d9c 96932->96934 96935 da3201 KillTimer 96932->96935 96939 da3246 CreatePopupMenu 96933->96939 96933->96961 96946 de2dd7 MoveWindow 96934->96946 96947 de2da1 96934->96947 96965 da30f2 Shell_NotifyIconW ___scrt_fastfail 96935->96965 96936 de2e1c 96970 dbe499 42 API calls 96936->96970 96944 de2e4d 96937->96944 96945 da31b9 96937->96945 96974 e0c161 27 API calls ___scrt_fastfail 96938->96974 96939->96961 96944->96926 96973 e00ad7 22 API calls 96944->96973 96949 da31c4 96945->96949 96950 da3253 96945->96950 96946->96961 96952 de2dc6 SetFocus 96947->96952 96953 de2da7 96947->96953 96948 da3214 96966 da3c50 DeleteObject DestroyWindow 96948->96966 96949->96926 96971 da30f2 Shell_NotifyIconW ___scrt_fastfail 96949->96971 96967 da326f 44 API calls ___scrt_fastfail 96950->96967 96951 de2e8e 96951->96926 96951->96961 96952->96961 96953->96949 96957 de2db0 96953->96957 96968 da18e2 10 API calls 96957->96968 96958->96926 96959 da3263 96959->96961 96963 de2e41 96972 da3837 49 API calls ___scrt_fastfail 96963->96972 96965->96948 96966->96961 96967->96959 96968->96961 96969->96936 96970->96949 96971->96963 96972->96958 96973->96958 96974->96959 96975->96951 96976 16295b 96979 1625d0 96976->96979 96978 1629a7 96992 160000 96979->96992 96982 1626a0 CreateFileW 96985 1626ad 96982->96985 96989 16266f 96982->96989 96983 1626c9 VirtualAlloc 96984 1626ea ReadFile 96983->96984 96983->96985 96984->96985 96988 162708 VirtualAlloc 96984->96988 96986 1628bc VirtualFree 96985->96986 96987 1628ca 96985->96987 96986->96987 96987->96978 96988->96985 96988->96989 96989->96983 96989->96985 96990 1627d0 CloseHandle 96989->96990 96991 1627e0 VirtualFree 96989->96991 96995 1634e0 GetPEB 96989->96995 96990->96989 96991->96989 96997 163480 GetPEB 96992->96997 96994 16068b 96994->96989 96996 16350a 96995->96996 96996->96982 96998 1634aa 96997->96998 96998->96994 99379 da2e37 99380 daa961 22 API calls 99379->99380 99381 da2e4d 99380->99381 99458 da4ae3 99381->99458 99383 da2e6b 99384 da3a5a 24 API calls 99383->99384 99385 da2e7f 99384->99385 99386 da9cb3 22 API calls 99385->99386 99387 da2e8c 99386->99387 99388 da4ecb 94 API calls 99387->99388 99389 da2ea5 99388->99389 99390 da2ead 99389->99390 99391 de2cb0 99389->99391 99394 daa8c7 22 API calls 99390->99394 99488 e12cf9 99391->99488 99393 de2cc3 99395 de2ccf 99393->99395 99397 da4f39 68 API calls 99393->99397 99396 da2ec3 99394->99396 99399 da4f39 68 API calls 99395->99399 99472 da6f88 22 API calls 99396->99472 99397->99395 99401 de2ce5 99399->99401 99400 da2ecf 99402 da9cb3 22 API calls 99400->99402 99514 da3084 22 API calls 99401->99514 99403 da2edc 99402->99403 99473 daa81b 41 API calls 99403->99473 99406 da2eec 99408 da9cb3 22 API calls 99406->99408 99407 de2d02 99515 da3084 22 API calls 99407->99515 99410 da2f12 99408->99410 99474 daa81b 41 API calls 99410->99474 99411 de2d1e 99413 da3a5a 24 API calls 99411->99413 99415 de2d44 99413->99415 99414 da2f21 99418 daa961 22 API calls 99414->99418 99516 da3084 22 API calls 99415->99516 99417 de2d50 99419 daa8c7 22 API calls 99417->99419 99420 da2f3f 99418->99420 99421 de2d5e 99419->99421 99475 da3084 22 API calls 99420->99475 99517 da3084 22 API calls 99421->99517 99424 da2f4b 99476 dc4a28 40 API calls 2 library calls 99424->99476 99425 de2d6d 99429 daa8c7 22 API calls 99425->99429 99427 da2f59 99427->99401 99428 da2f63 99427->99428 99477 dc4a28 40 API calls 2 library calls 99428->99477 99431 de2d83 99429->99431 99518 da3084 22 API calls 99431->99518 99432 da2f6e 99432->99407 99434 da2f78 99432->99434 99478 dc4a28 40 API calls 2 library calls 99434->99478 99435 de2d90 99437 da2f83 99437->99411 99438 da2f8d 99437->99438 99479 dc4a28 40 API calls 2 library calls 99438->99479 99440 da2f98 99441 da2fdc 99440->99441 99480 da3084 22 API calls 99440->99480 99441->99425 99442 da2fe8 99441->99442 99442->99435 99482 da63eb 22 API calls 99442->99482 99444 da2fbf 99447 daa8c7 22 API calls 99444->99447 99446 da2ff8 99483 da6a50 22 API calls 99446->99483 99449 da2fcd 99447->99449 99481 da3084 22 API calls 99449->99481 99450 da3006 99484 da70b0 23 API calls 99450->99484 99455 da3021 99456 da3065 99455->99456 99485 da6f88 22 API calls 99455->99485 99486 da70b0 23 API calls 99455->99486 99487 da3084 22 API calls 99455->99487 99459 da4af0 __wsopen_s 99458->99459 99460 da6b57 22 API calls 99459->99460 99461 da4b22 99459->99461 99460->99461 99462 da4c6d 22 API calls 99461->99462 99463 da4b58 99461->99463 99462->99461 99464 da4c29 99463->99464 99467 da9cb3 22 API calls 99463->99467 99470 da4c6d 22 API calls 99463->99470 99471 da515f 22 API calls 99463->99471 99465 da4c5e 99464->99465 99466 da9cb3 22 API calls 99464->99466 99465->99383 99468 da4c52 99466->99468 99467->99463 99469 da515f 22 API calls 99468->99469 99469->99465 99470->99463 99471->99463 99472->99400 99473->99406 99474->99414 99475->99424 99476->99427 99477->99432 99478->99437 99479->99440 99480->99444 99481->99441 99482->99446 99483->99450 99484->99455 99485->99455 99486->99455 99487->99455 99489 e12d15 99488->99489 99490 da511f 64 API calls 99489->99490 99491 e12d29 99490->99491 99492 e12e66 75 API calls 99491->99492 99493 e12d3b 99492->99493 99494 da50f5 40 API calls 99493->99494 99511 e12d3f 99493->99511 99495 e12d56 99494->99495 99496 da50f5 40 API calls 99495->99496 99497 e12d66 99496->99497 99498 da50f5 40 API calls 99497->99498 99499 e12d81 99498->99499 99500 da50f5 40 API calls 99499->99500 99501 e12d9c 99500->99501 99502 da511f 64 API calls 99501->99502 99503 e12db3 99502->99503 99504 dcea0c ___std_exception_copy 21 API calls 99503->99504 99505 e12dba 99504->99505 99506 dcea0c ___std_exception_copy 21 API calls 99505->99506 99507 e12dc4 99506->99507 99508 da50f5 40 API calls 99507->99508 99509 e12dd8 99508->99509 99510 e128fe 27 API calls 99509->99510 99512 e12dee 99510->99512 99511->99393 99512->99511 99513 e122ce 79 API calls 99512->99513 99513->99511 99514->99407 99515->99411 99516->99417 99517->99425 99518->99435 99519 dc03e9 99524 dc09d5 SetUnhandledExceptionFilter 99519->99524 99521 dc03ee pre_c_initialization 99525 dc4fa9 26 API calls 2 library calls 99521->99525 99523 dc03f9 99524->99521 99525->99523 99526 da1cad SystemParametersInfoW 99527 da2de3 99528 da2df0 __wsopen_s 99527->99528 99529 da2e09 99528->99529 99530 de2c2b ___scrt_fastfail 99528->99530 99531 da3aa2 23 API calls 99529->99531 99533 de2c47 GetOpenFileNameW 99530->99533 99532 da2e12 99531->99532 99543 da2da5 99532->99543 99534 de2c96 99533->99534 99536 da6b57 22 API calls 99534->99536 99538 de2cab 99536->99538 99538->99538 99540 da2e27 99561 da44a8 99540->99561 99544 de1f50 __wsopen_s 99543->99544 99545 da2db2 GetLongPathNameW 99544->99545 99546 da6b57 22 API calls 99545->99546 99547 da2dda 99546->99547 99548 da3598 99547->99548 99549 daa961 22 API calls 99548->99549 99550 da35aa 99549->99550 99551 da3aa2 23 API calls 99550->99551 99552 da35b5 99551->99552 99553 da35c0 99552->99553 99557 de32eb 99552->99557 99554 da515f 22 API calls 99553->99554 99556 da35cc 99554->99556 99590 da35f3 99556->99590 99559 de330d 99557->99559 99596 dbce60 41 API calls 99557->99596 99560 da35df 99560->99540 99562 da4ecb 94 API calls 99561->99562 99563 da44cd 99562->99563 99564 de3833 99563->99564 99565 da4ecb 94 API calls 99563->99565 99566 e12cf9 80 API calls 99564->99566 99567 da44e1 99565->99567 99568 de3848 99566->99568 99567->99564 99569 da44e9 99567->99569 99570 de384c 99568->99570 99571 de3869 99568->99571 99573 de3854 99569->99573 99574 da44f5 99569->99574 99575 da4f39 68 API calls 99570->99575 99572 dbfe0b 22 API calls 99571->99572 99582 de38ae 99572->99582 99598 e0da5a 82 API calls 99573->99598 99597 da940c 136 API calls 2 library calls 99574->99597 99575->99573 99578 da2e31 99579 de3862 99579->99571 99580 da4f39 68 API calls 99584 de3a5f 99580->99584 99582->99584 99587 da9cb3 22 API calls 99582->99587 99599 e0967e 22 API calls __fread_nolock 99582->99599 99600 e095ad 42 API calls _wcslen 99582->99600 99601 e10b5a 22 API calls 99582->99601 99602 daa4a1 22 API calls __fread_nolock 99582->99602 99603 da3ff7 22 API calls 99582->99603 99584->99580 99604 e0989b 82 API calls __wsopen_s 99584->99604 99587->99582 99591 da3605 99590->99591 99595 da3624 __fread_nolock 99590->99595 99593 dbfe0b 22 API calls 99591->99593 99592 dbfddb 22 API calls 99594 da363b 99592->99594 99593->99595 99594->99560 99595->99592 99596->99557 99597->99578 99598->99579 99599->99582 99600->99582 99601->99582 99602->99582 99603->99582 99604->99584 99605 de2ba5 99606 de2baf 99605->99606 99607 da2b25 99605->99607 99609 da3a5a 24 API calls 99606->99609 99633 da2b83 7 API calls 99607->99633 99611 de2bb8 99609->99611 99612 da9cb3 22 API calls 99611->99612 99614 de2bc6 99612->99614 99617 de2bce 99614->99617 99618 de2bf5 99614->99618 99615 da2b2f 99616 da2b44 99615->99616 99637 da3837 49 API calls ___scrt_fastfail 99615->99637 99624 da2b5f 99616->99624 99638 da30f2 Shell_NotifyIconW ___scrt_fastfail 99616->99638 99620 da33c6 22 API calls 99617->99620 99621 da33c6 22 API calls 99618->99621 99622 de2bd9 99620->99622 99623 de2bf1 GetForegroundWindow ShellExecuteW 99621->99623 99625 da6350 22 API calls 99622->99625 99629 de2c26 99623->99629 99631 da2b66 SetCurrentDirectoryW 99624->99631 99628 de2be7 99625->99628 99630 da33c6 22 API calls 99628->99630 99629->99624 99630->99623 99632 da2b7a 99631->99632 99639 da2cd4 7 API calls 99633->99639 99635 da2b2a 99636 da2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99635->99636 99636->99615 99637->99616 99638->99624 99639->99635 99640 da6a26 99641 dbfddb 22 API calls 99640->99641 99642 da6a33 99641->99642 96999 da1044 97004 da10f3 96999->97004 97041 da1398 97004->97041 97008 da116a 97009 daa961 22 API calls 97008->97009 97010 da1174 97009->97010 97011 daa961 22 API calls 97010->97011 97012 da117e 97011->97012 97013 daa961 22 API calls 97012->97013 97014 da1188 97013->97014 97015 daa961 22 API calls 97014->97015 97016 da11c6 97015->97016 97017 daa961 22 API calls 97016->97017 97018 da1292 97017->97018 97051 da171c 97018->97051 97022 da12c4 97023 daa961 22 API calls 97022->97023 97024 da12ce 97023->97024 97072 db1940 97024->97072 97091 da13f1 97041->97091 97044 da13f1 22 API calls 97045 da13d0 97044->97045 97046 daa961 22 API calls 97045->97046 97047 da13dc 97046->97047 97048 da6b57 22 API calls 97047->97048 97049 da1129 97048->97049 97050 da1bc3 6 API calls 97049->97050 97050->97008 97052 daa961 22 API calls 97051->97052 97053 da172c 97052->97053 97054 daa961 22 API calls 97053->97054 97055 da1734 97054->97055 97056 daa961 22 API calls 97055->97056 97057 da174f 97056->97057 97058 dbfddb 22 API calls 97057->97058 97059 da129c 97058->97059 97060 da1b4a 97059->97060 97061 da1b58 97060->97061 97062 daa961 22 API calls 97061->97062 97063 da1b63 97062->97063 97064 daa961 22 API calls 97063->97064 97065 da1b6e 97064->97065 97066 daa961 22 API calls 97065->97066 97067 da1b79 97066->97067 97068 daa961 22 API calls 97067->97068 97069 da1b84 97068->97069 97070 dbfddb 22 API calls 97069->97070 97071 da1b96 RegisterWindowMessageW 97070->97071 97071->97022 97073 db1981 97072->97073 97081 db195d 97072->97081 97098 dc0242 5 API calls __Init_thread_wait 97073->97098 97074 db196e 97081->97074 97100 dc0242 5 API calls __Init_thread_wait 97081->97100 97092 daa961 22 API calls 97091->97092 97093 da13fc 97092->97093 97094 daa961 22 API calls 97093->97094 97095 da1404 97094->97095 97096 daa961 22 API calls 97095->97096 97097 da13c6 97096->97097 97097->97044 97104 df3a41 97108 e110c0 97104->97108 97106 df3a4c 97107 e110c0 53 API calls 97106->97107 97107->97106 97109 e110fa 97108->97109 97113 e110cd 97108->97113 97109->97106 97110 e110fc 97152 dbfa11 53 API calls 97110->97152 97111 e11101 97119 da7510 97111->97119 97113->97109 97113->97110 97113->97111 97117 e110f4 97113->97117 97151 dab270 39 API calls 97117->97151 97120 da7522 97119->97120 97121 da7525 97119->97121 97142 da6350 97120->97142 97122 da755b 97121->97122 97123 da752d 97121->97123 97125 de50f6 97122->97125 97128 da756d 97122->97128 97133 de500f 97122->97133 97153 dc51c6 26 API calls 97123->97153 97156 dc5183 26 API calls 97125->97156 97126 da753d 97132 dbfddb 22 API calls 97126->97132 97154 dbfb21 51 API calls 97128->97154 97129 de510e 97129->97129 97134 da7547 97132->97134 97136 dbfe0b 22 API calls 97133->97136 97137 de5088 97133->97137 97135 da9cb3 22 API calls 97134->97135 97135->97120 97138 de5058 97136->97138 97155 dbfb21 51 API calls 97137->97155 97139 dbfddb 22 API calls 97138->97139 97140 de507f 97139->97140 97141 da9cb3 22 API calls 97140->97141 97141->97137 97143 da6362 97142->97143 97144 de4a51 97142->97144 97157 da6373 97143->97157 97167 da4a88 22 API calls __fread_nolock 97144->97167 97147 da636e 97147->97109 97148 de4a5b 97149 de4a67 97148->97149 97150 daa8c7 22 API calls 97148->97150 97150->97149 97151->97109 97152->97111 97153->97126 97154->97126 97155->97125 97156->97129 97158 da6382 97157->97158 97163 da63b6 __fread_nolock 97157->97163 97159 de4a82 97158->97159 97160 da63a9 97158->97160 97158->97163 97162 dbfddb 22 API calls 97159->97162 97161 daa587 22 API calls 97160->97161 97161->97163 97164 de4a91 97162->97164 97163->97147 97165 dbfe0b 22 API calls 97164->97165 97166 de4ac5 __fread_nolock 97165->97166 97167->97148 97168 dd8402 97173 dd81be 97168->97173 97171 dd842a 97178 dd81ef try_get_first_available_module 97173->97178 97175 dd83ee 97192 dd27ec 26 API calls _strftime 97175->97192 97177 dd8343 97177->97171 97185 de0984 97177->97185 97178->97178 97181 dd8338 97178->97181 97188 dc8e0b 40 API calls 2 library calls 97178->97188 97180 dd838c 97180->97181 97189 dc8e0b 40 API calls 2 library calls 97180->97189 97181->97177 97191 dcf2d9 20 API calls _free 97181->97191 97183 dd83ab 97183->97181 97190 dc8e0b 40 API calls 2 library calls 97183->97190 97193 de0081 97185->97193 97187 de099f 97187->97171 97188->97180 97189->97183 97190->97181 97191->97175 97192->97177 97194 de008d ___scrt_is_nonwritable_in_current_image 97193->97194 97195 de009b 97194->97195 97198 de00d4 97194->97198 97251 dcf2d9 20 API calls _free 97195->97251 97197 de00a0 97252 dd27ec 26 API calls _strftime 97197->97252 97204 de065b 97198->97204 97203 de00aa __fread_nolock 97203->97187 97254 de042f 97204->97254 97207 de068d 97286 dcf2c6 20 API calls _free 97207->97286 97208 de06a6 97272 dd5221 97208->97272 97211 de0692 97287 dcf2d9 20 API calls _free 97211->97287 97212 de06ab 97213 de06cb 97212->97213 97214 de06b4 97212->97214 97285 de039a CreateFileW 97213->97285 97288 dcf2c6 20 API calls _free 97214->97288 97218 de06b9 97289 dcf2d9 20 API calls _free 97218->97289 97219 de00f8 97253 de0121 LeaveCriticalSection __wsopen_s 97219->97253 97221 de0781 GetFileType 97222 de078c GetLastError 97221->97222 97223 de07d3 97221->97223 97292 dcf2a3 20 API calls 2 library calls 97222->97292 97294 dd516a 21 API calls 3 library calls 97223->97294 97224 de0756 GetLastError 97291 dcf2a3 20 API calls 2 library calls 97224->97291 97226 de0704 97226->97221 97226->97224 97290 de039a CreateFileW 97226->97290 97228 de079a CloseHandle 97228->97211 97230 de07c3 97228->97230 97293 dcf2d9 20 API calls _free 97230->97293 97232 de0749 97232->97221 97232->97224 97234 de07f4 97236 de0840 97234->97236 97295 de05ab 72 API calls 4 library calls 97234->97295 97235 de07c8 97235->97211 97240 de086d 97236->97240 97296 de014d 72 API calls 4 library calls 97236->97296 97239 de0866 97239->97240 97241 de087e 97239->97241 97297 dd86ae 97240->97297 97241->97219 97243 de08fc CloseHandle 97241->97243 97312 de039a CreateFileW 97243->97312 97245 de0927 97246 de095d 97245->97246 97247 de0931 GetLastError 97245->97247 97246->97219 97313 dcf2a3 20 API calls 2 library calls 97247->97313 97249 de093d 97314 dd5333 21 API calls 3 library calls 97249->97314 97251->97197 97252->97203 97253->97203 97255 de046a 97254->97255 97256 de0450 97254->97256 97315 de03bf 97255->97315 97256->97255 97322 dcf2d9 20 API calls _free 97256->97322 97259 de045f 97323 dd27ec 26 API calls _strftime 97259->97323 97261 de04a2 97262 de04d1 97261->97262 97324 dcf2d9 20 API calls _free 97261->97324 97270 de0524 97262->97270 97326 dcd70d 26 API calls 2 library calls 97262->97326 97265 de051f 97267 de059e 97265->97267 97265->97270 97266 de04c6 97325 dd27ec 26 API calls _strftime 97266->97325 97327 dd27fc 11 API calls _abort 97267->97327 97270->97207 97270->97208 97271 de05aa 97273 dd522d ___scrt_is_nonwritable_in_current_image 97272->97273 97330 dd2f5e EnterCriticalSection 97273->97330 97275 dd527b 97331 dd532a 97275->97331 97277 dd5234 97277->97275 97278 dd5259 97277->97278 97282 dd52c7 EnterCriticalSection 97277->97282 97334 dd5000 21 API calls 2 library calls 97278->97334 97279 dd52a4 __fread_nolock 97279->97212 97281 dd525e 97281->97275 97335 dd5147 EnterCriticalSection 97281->97335 97282->97275 97284 dd52d4 LeaveCriticalSection 97282->97284 97284->97277 97285->97226 97286->97211 97287->97219 97288->97218 97289->97211 97290->97232 97291->97211 97292->97228 97293->97235 97294->97234 97295->97236 97296->97239 97337 dd53c4 97297->97337 97299 dd86c4 97350 dd5333 21 API calls 3 library calls 97299->97350 97301 dd86be 97301->97299 97304 dd53c4 __wsopen_s 26 API calls 97301->97304 97311 dd86f6 97301->97311 97302 dd53c4 __wsopen_s 26 API calls 97306 dd8702 CloseHandle 97302->97306 97303 dd871c 97310 dd873e 97303->97310 97351 dcf2a3 20 API calls 2 library calls 97303->97351 97305 dd86ed 97304->97305 97307 dd53c4 __wsopen_s 26 API calls 97305->97307 97306->97299 97308 dd870e GetLastError 97306->97308 97307->97311 97308->97299 97310->97219 97311->97299 97311->97302 97312->97245 97313->97249 97314->97246 97317 de03d7 97315->97317 97316 de03f2 97316->97261 97317->97316 97328 dcf2d9 20 API calls _free 97317->97328 97319 de0416 97329 dd27ec 26 API calls _strftime 97319->97329 97321 de0421 97321->97261 97322->97259 97323->97255 97324->97266 97325->97262 97326->97265 97327->97271 97328->97319 97329->97321 97330->97277 97336 dd2fa6 LeaveCriticalSection 97331->97336 97333 dd5331 97333->97279 97334->97281 97335->97275 97336->97333 97338 dd53e6 97337->97338 97339 dd53d1 97337->97339 97344 dd540b 97338->97344 97354 dcf2c6 20 API calls _free 97338->97354 97352 dcf2c6 20 API calls _free 97339->97352 97341 dd53d6 97353 dcf2d9 20 API calls _free 97341->97353 97344->97301 97345 dd5416 97355 dcf2d9 20 API calls _free 97345->97355 97346 dd53de 97346->97301 97348 dd541e 97356 dd27ec 26 API calls _strftime 97348->97356 97350->97303 97351->97310 97352->97341 97353->97346 97354->97345 97355->97348 97356->97346 97357 df2a00 97372 dad7b0 messages 97357->97372 97358 dadb11 PeekMessageW 97358->97372 97359 dad807 GetInputState 97359->97358 97359->97372 97360 df1cbe TranslateAcceleratorW 97360->97372 97362 dadb8f PeekMessageW 97362->97372 97363 dada04 timeGetTime 97363->97372 97364 dadb73 TranslateMessage DispatchMessageW 97364->97362 97365 dadbaf Sleep 97383 dadbc0 97365->97383 97366 df2b74 Sleep 97366->97383 97367 dbe551 timeGetTime 97367->97383 97368 df1dda timeGetTime 97537 dbe300 23 API calls 97368->97537 97371 df2c0b GetExitCodeProcess 97376 df2c37 CloseHandle 97371->97376 97377 df2c21 WaitForSingleObject 97371->97377 97372->97358 97372->97359 97372->97360 97372->97362 97372->97363 97372->97364 97372->97365 97372->97366 97372->97368 97373 dad9d5 97372->97373 97384 daec40 256 API calls 97372->97384 97389 dadd50 97372->97389 97396 dadfd0 97372->97396 97419 db1310 97372->97419 97478 dabf40 97372->97478 97536 dbedf6 IsDialogMessageW GetClassLongW 97372->97536 97538 e13a2a 23 API calls 97372->97538 97539 e1359c 82 API calls __wsopen_s 97372->97539 97374 e329bf GetForegroundWindow 97374->97383 97376->97383 97377->97372 97377->97376 97378 df2a31 97378->97373 97379 df2ca9 Sleep 97379->97372 97383->97367 97383->97371 97383->97372 97383->97373 97383->97374 97383->97378 97383->97379 97540 e25658 23 API calls 97383->97540 97541 e0e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97383->97541 97542 e0d4dc 47 API calls 97383->97542 97384->97372 97390 dadd6f 97389->97390 97391 dadd83 97389->97391 97543 dad260 256 API calls 2 library calls 97390->97543 97544 e1359c 82 API calls __wsopen_s 97391->97544 97393 dadd7a 97393->97372 97395 df2f75 97395->97395 97397 dae010 97396->97397 97413 dae0dc messages 97397->97413 97547 dc0242 5 API calls __Init_thread_wait 97397->97547 97398 daec40 256 API calls 97398->97413 97401 df2fca 97403 daa961 22 API calls 97401->97403 97401->97413 97402 daa961 22 API calls 97402->97413 97404 df2fe4 97403->97404 97548 dc00a3 29 API calls __onexit 97404->97548 97408 df2fee 97549 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97408->97549 97412 daa8c7 22 API calls 97412->97413 97413->97398 97413->97402 97413->97412 97414 dae3e1 97413->97414 97415 db04f0 22 API calls 97413->97415 97416 e1359c 82 API calls 97413->97416 97545 daa81b 41 API calls 97413->97545 97546 dba308 256 API calls 97413->97546 97550 dc0242 5 API calls __Init_thread_wait 97413->97550 97551 dc00a3 29 API calls __onexit 97413->97551 97552 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97413->97552 97553 e247d4 256 API calls 97413->97553 97554 e268c1 256 API calls 97413->97554 97414->97372 97415->97413 97416->97413 97420 db17b0 97419->97420 97421 db1376 97419->97421 97774 dc0242 5 API calls __Init_thread_wait 97420->97774 97422 db1390 97421->97422 97423 df6331 97421->97423 97425 db1940 9 API calls 97422->97425 97426 df633d 97423->97426 97779 e2709c 256 API calls 97423->97779 97429 db13a0 97425->97429 97426->97372 97428 db17ba 97430 db17fb 97428->97430 97432 da9cb3 22 API calls 97428->97432 97431 db1940 9 API calls 97429->97431 97434 df6346 97430->97434 97436 db182c 97430->97436 97433 db13b6 97431->97433 97440 db17d4 97432->97440 97433->97430 97435 db13ec 97433->97435 97780 e1359c 82 API calls __wsopen_s 97434->97780 97435->97434 97459 db1408 __fread_nolock 97435->97459 97776 daaceb 23 API calls messages 97436->97776 97439 db1839 97777 dbd217 256 API calls 97439->97777 97775 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97440->97775 97443 df636e 97781 e1359c 82 API calls __wsopen_s 97443->97781 97445 db152f 97446 db153c 97445->97446 97447 df63d1 97445->97447 97448 db1940 9 API calls 97446->97448 97783 e25745 54 API calls _wcslen 97447->97783 97450 db1549 97448->97450 97454 df64fa 97450->97454 97456 db1940 9 API calls 97450->97456 97451 dbfddb 22 API calls 97451->97459 97452 db1872 97778 dbfaeb 23 API calls 97452->97778 97453 dbfe0b 22 API calls 97453->97459 97463 df6369 97454->97463 97784 e1359c 82 API calls __wsopen_s 97454->97784 97461 db1563 97456->97461 97458 daec40 256 API calls 97458->97459 97459->97439 97459->97443 97459->97445 97459->97451 97459->97453 97459->97458 97460 df63b2 97459->97460 97459->97463 97782 e1359c 82 API calls __wsopen_s 97460->97782 97461->97454 97464 daa8c7 22 API calls 97461->97464 97466 db15c7 messages 97461->97466 97463->97372 97464->97466 97465 db1940 9 API calls 97465->97466 97466->97452 97466->97454 97466->97463 97466->97465 97468 db167b messages 97466->97468 97555 e1744a 97466->97555 97612 da4f39 97466->97612 97618 e0d4ce 97466->97618 97621 e2959f 97466->97621 97624 e2958b 97466->97624 97627 e1f0ec 97466->97627 97636 dbeffa 97466->97636 97693 e16ef1 97466->97693 97467 db171d 97467->97372 97468->97467 97773 dbce17 22 API calls messages 97468->97773 98891 daadf0 97478->98891 97480 dabf9d 97481 dabfa9 97480->97481 97482 df04b6 97480->97482 97483 df04c6 97481->97483 97484 dac01e 97481->97484 98910 e1359c 82 API calls __wsopen_s 97482->98910 98911 e1359c 82 API calls __wsopen_s 97483->98911 98896 daac91 97484->98896 97488 dac7da 97492 dbfe0b 22 API calls 97488->97492 97497 dac808 __fread_nolock 97492->97497 97494 df04f5 97498 df055a 97494->97498 98912 dbd217 256 API calls 97494->98912 97503 dbfe0b 22 API calls 97497->97503 97522 dac603 97498->97522 98913 e1359c 82 API calls __wsopen_s 97498->98913 97499 daec40 256 API calls 97533 dac039 __fread_nolock messages 97499->97533 97500 daaf8a 22 API calls 97500->97533 97501 e07120 22 API calls 97501->97533 97502 df091a 98923 e13209 23 API calls 97502->98923 97534 dac350 __fread_nolock messages 97503->97534 97506 df08a5 97507 daec40 256 API calls 97506->97507 97509 df08cf 97507->97509 97509->97522 98921 daa81b 41 API calls 97509->98921 97510 df0591 98914 e1359c 82 API calls __wsopen_s 97510->98914 97511 df08f6 98922 e1359c 82 API calls __wsopen_s 97511->98922 97516 dabbe0 40 API calls 97516->97533 97518 dac253 97523 df0976 97518->97523 97528 dac297 messages 97518->97528 97519 dac237 97519->97518 97521 daa8c7 22 API calls 97519->97521 97520 dbfe0b 22 API calls 97520->97533 97521->97518 97522->97372 98924 daaceb 23 API calls messages 97523->98924 97526 df09bf 97526->97522 98925 e1359c 82 API calls __wsopen_s 97526->98925 97527 dbfddb 22 API calls 97527->97533 97528->97526 98907 daaceb 23 API calls messages 97528->98907 97530 dac335 97530->97526 97531 dac342 97530->97531 98908 daa704 22 API calls messages 97531->98908 97533->97488 97533->97494 97533->97497 97533->97498 97533->97499 97533->97500 97533->97501 97533->97502 97533->97506 97533->97510 97533->97511 97533->97516 97533->97519 97533->97520 97533->97522 97533->97526 97533->97527 98900 daad81 97533->98900 98915 e07099 22 API calls __fread_nolock 97533->98915 98916 e25745 54 API calls _wcslen 97533->98916 98917 dbaa42 22 API calls messages 97533->98917 98918 e0f05c 40 API calls 97533->98918 98919 daa993 41 API calls 97533->98919 98920 daaceb 23 API calls messages 97533->98920 97535 dac3ac 97534->97535 98909 dbce17 22 API calls messages 97534->98909 97535->97372 97536->97372 97537->97372 97538->97372 97539->97372 97540->97383 97541->97383 97542->97383 97543->97393 97544->97395 97545->97413 97546->97413 97547->97401 97548->97408 97549->97413 97550->97413 97551->97413 97552->97413 97553->97413 97554->97413 97556 e17469 97555->97556 97557 e17474 97555->97557 97812 dab567 97556->97812 97561 daa961 22 API calls 97557->97561 97598 e17554 97557->97598 97559 dbfddb 22 API calls 97560 e17587 97559->97560 97562 dbfe0b 22 API calls 97560->97562 97563 e17495 97561->97563 97564 e17598 97562->97564 97565 daa961 22 API calls 97563->97565 97785 da6246 97564->97785 97566 e1749e 97565->97566 97568 da7510 53 API calls 97566->97568 97570 e174aa 97568->97570 97817 da525f 97570->97817 97571 daa961 22 API calls 97573 e175ab 97571->97573 97575 da6246 CloseHandle 97573->97575 97574 e174bf 97576 da6350 22 API calls 97574->97576 97577 e175b2 97575->97577 97578 e174f2 97576->97578 97579 da7510 53 API calls 97577->97579 97580 e1754a 97578->97580 97582 e0d4ce 4 API calls 97578->97582 97581 e175be 97579->97581 97584 dab567 39 API calls 97580->97584 97583 da6246 CloseHandle 97581->97583 97585 e17502 97582->97585 97586 e175c8 97583->97586 97584->97598 97585->97580 97587 e17506 97585->97587 97789 da5745 97586->97789 97589 da9cb3 22 API calls 97587->97589 97591 e17513 97589->97591 97592 e175ea 97797 da53de 97592->97797 97593 e176de GetLastError 97595 e176f7 97593->97595 97863 da6216 CloseHandle messages 97595->97863 97598->97559 97610 e176a4 97598->97610 97600 e175f8 97860 da53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97600->97860 97602 e17645 97603 dbfddb 22 API calls 97602->97603 97606 e17679 97603->97606 97604 e175ff 97604->97602 97605 e17619 97604->97605 97861 e0ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97605->97861 97608 daa961 22 API calls 97606->97608 97609 e17686 97608->97609 97609->97610 97862 e0417d 22 API calls __fread_nolock 97609->97862 97610->97466 97613 da4f4a 97612->97613 97614 da4f43 97612->97614 97616 da4f6a FreeLibrary 97613->97616 97617 da4f59 97613->97617 97901 dce678 97614->97901 97616->97617 97617->97466 98148 e0dbbe lstrlenW 97618->98148 98153 e27f59 97621->98153 97623 e295af 97623->97466 97625 e27f59 120 API calls 97624->97625 97626 e2959b 97625->97626 97626->97466 97628 da7510 53 API calls 97627->97628 97629 e1f126 97628->97629 98245 da9e90 97629->98245 97631 e1f136 97632 e1f15b 97631->97632 97633 daec40 256 API calls 97631->97633 97635 e1f15f 97632->97635 98273 da9c6e 97632->98273 97633->97632 97635->97466 97637 da9c6e 22 API calls 97636->97637 97638 dbf012 97637->97638 97639 dbfddb 22 API calls 97638->97639 97643 dff0a8 97638->97643 97641 dbf02b 97639->97641 97642 dbfe0b 22 API calls 97641->97642 97644 dbf03c 97642->97644 97683 dbf0a4 97643->97683 98320 e19caa 39 API calls 97643->98320 97645 da6246 CloseHandle 97644->97645 97646 dbf047 97645->97646 97648 daa961 22 API calls 97646->97648 97647 dab567 39 API calls 97649 dff10a 97647->97649 97650 dbf04f 97648->97650 97651 dbf0b1 97649->97651 97652 dff112 97649->97652 97654 da6246 CloseHandle 97650->97654 97655 dbfa5b 3 API calls 97651->97655 97653 dab567 39 API calls 97652->97653 97659 dbf0b8 97653->97659 97656 dbf056 97654->97656 97655->97659 97657 da7510 53 API calls 97656->97657 97658 dbf062 97657->97658 97660 da6246 CloseHandle 97658->97660 97662 dff127 97659->97662 97663 dbf0d3 97659->97663 97661 dbf06c 97660->97661 97664 da5745 5 API calls 97661->97664 97666 dbfe0b 22 API calls 97662->97666 97665 da6270 22 API calls 97663->97665 97667 dbf07d 97664->97667 97668 dbf0db 97665->97668 97669 dff12c 97666->97669 97670 dff0a0 97667->97670 97673 dbf085 97667->97673 98301 dbf141 97668->98301 97677 dff140 97669->97677 98321 dbf866 ReadFile SetFilePointerEx 97669->98321 98319 da6216 CloseHandle messages 97670->98319 97678 da53de 27 API calls 97673->97678 97674 dbf0ea 97681 dff144 __fread_nolock 97674->97681 98316 da62b5 22 API calls 97674->98316 97677->97681 98322 e10e85 22 API calls ___scrt_fastfail 97677->98322 97680 dbf093 97678->97680 98315 da53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97680->98315 97683->97647 97683->97651 97684 dbf0fe 97687 dbf138 97684->97687 97688 da6246 CloseHandle 97684->97688 97685 dff069 98318 e0ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97685->98318 97686 dbf09a 97686->97683 97686->97685 97687->97466 97690 dbf12c 97688->97690 97690->97687 98317 da6216 CloseHandle messages 97690->98317 97691 dff080 97691->97683 97694 daa961 22 API calls 97693->97694 97695 e16f1d 97694->97695 97696 daa961 22 API calls 97695->97696 97697 e16f26 97696->97697 97698 e16f3a 97697->97698 97699 dab567 39 API calls 97697->97699 97700 da7510 53 API calls 97698->97700 97699->97698 97706 e16f57 _wcslen 97700->97706 97701 e16fbc 97704 da7510 53 API calls 97701->97704 97702 e170bf 98353 da4ecb 97702->98353 97707 e16fc8 97704->97707 97706->97701 97706->97702 97715 e170e9 97706->97715 97711 daa8c7 22 API calls 97707->97711 97714 e16fdb 97707->97714 97708 e170e5 97710 daa961 22 API calls 97708->97710 97708->97715 97709 da4ecb 94 API calls 97709->97708 97712 e1711a 97710->97712 97711->97714 97716 daa961 22 API calls 97712->97716 97713 e17027 97718 da7510 53 API calls 97713->97718 97714->97713 97717 e17005 97714->97717 97720 daa8c7 22 API calls 97714->97720 97715->97466 97719 e17126 97716->97719 97721 da33c6 22 API calls 97717->97721 97722 e17034 97718->97722 97723 daa961 22 API calls 97719->97723 97720->97717 97725 e1700f 97721->97725 97726 e17047 97722->97726 97727 e1703d 97722->97727 97730 da7510 53 API calls 97725->97730 98484 e0e199 GetFileAttributesW 97726->98484 97731 daa8c7 22 API calls 97727->97731 97733 e1701b 97730->97733 97731->97726 97737 da6350 22 API calls 97733->97737 97734 e17063 97740 da7510 53 API calls 97734->97740 97746 e17069 97734->97746 97735 e17050 97735->97734 97738 da4c6d 22 API calls 97735->97738 97737->97713 97738->97734 97742 e170a0 97740->97742 98485 e0d076 57 API calls 97742->98485 97746->97715 97773->97468 97774->97428 97775->97430 97776->97439 97777->97452 97778->97452 97779->97426 97780->97463 97781->97463 97782->97463 97783->97461 97784->97463 97786 da625f 97785->97786 97787 da6250 97785->97787 97786->97787 97788 da6264 CloseHandle 97786->97788 97787->97571 97788->97787 97790 da575c CreateFileW 97789->97790 97791 de4035 97789->97791 97792 da577b 97790->97792 97791->97792 97793 de403b CreateFileW 97791->97793 97792->97592 97792->97593 97793->97792 97794 de4063 97793->97794 97864 da54c6 97794->97864 97798 da53f3 97797->97798 97811 da53f0 messages 97797->97811 97799 da54c6 3 API calls 97798->97799 97798->97811 97800 da5410 97799->97800 97801 de3f4b 97800->97801 97802 da541d 97800->97802 97876 dbfa5b 97801->97876 97803 dbfe0b 22 API calls 97802->97803 97805 da5429 97803->97805 97806 da5722 22 API calls 97805->97806 97807 da5433 97806->97807 97870 da9a40 97807->97870 97810 da54c6 3 API calls 97810->97811 97811->97600 97813 dab578 97812->97813 97814 dab57f 97812->97814 97813->97814 97882 dc62d1 39 API calls _strftime 97813->97882 97814->97557 97816 dab5c2 97816->97557 97818 daa961 22 API calls 97817->97818 97819 da5275 97818->97819 97820 daa961 22 API calls 97819->97820 97821 da527d 97820->97821 97822 daa961 22 API calls 97821->97822 97823 da5285 97822->97823 97824 daa961 22 API calls 97823->97824 97825 da528d 97824->97825 97826 de3df5 97825->97826 97827 da52c1 97825->97827 97828 daa8c7 22 API calls 97826->97828 97829 da6d25 22 API calls 97827->97829 97830 de3dfe 97828->97830 97831 da52cf 97829->97831 97832 daa6c3 22 API calls 97830->97832 97833 da93b2 22 API calls 97831->97833 97836 da5304 97832->97836 97834 da52d9 97833->97834 97835 da6d25 22 API calls 97834->97835 97834->97836 97838 da52fa 97835->97838 97839 da5325 97836->97839 97851 da5349 97836->97851 97858 de3e20 97836->97858 97840 da93b2 22 API calls 97838->97840 97839->97851 97896 da4c6d 97839->97896 97840->97836 97842 da535a 97843 da5370 97842->97843 97847 daa8c7 22 API calls 97842->97847 97844 da5384 97843->97844 97849 daa8c7 22 API calls 97843->97849 97848 da538f 97844->97848 97852 daa8c7 22 API calls 97844->97852 97846 da6b57 22 API calls 97855 de3ee0 97846->97855 97847->97843 97853 daa8c7 22 API calls 97848->97853 97856 da539a 97848->97856 97849->97844 97850 da6d25 22 API calls 97850->97851 97883 da6d25 97851->97883 97852->97848 97853->97856 97854 da4c6d 22 API calls 97854->97855 97855->97851 97855->97854 97899 da49bd 22 API calls __fread_nolock 97855->97899 97856->97574 97858->97846 97860->97604 97861->97602 97862->97610 97863->97610 97869 da54dd 97864->97869 97865 de3f9c SetFilePointerEx 97866 da5564 SetFilePointerEx SetFilePointerEx 97868 da5530 97866->97868 97867 de3f8b 97867->97865 97868->97792 97869->97865 97869->97866 97869->97867 97869->97868 97871 da9abb 97870->97871 97875 da9a4e 97870->97875 97881 dbe40f SetFilePointerEx 97871->97881 97873 da543f 97873->97810 97874 da9a8c ReadFile 97874->97873 97874->97875 97875->97873 97875->97874 97877 da54c6 3 API calls 97876->97877 97878 dbfa79 97877->97878 97879 da54c6 3 API calls 97878->97879 97880 dbfa9a 97879->97880 97880->97811 97881->97875 97882->97816 97884 da6d91 97883->97884 97885 da6d34 97883->97885 97887 da93b2 22 API calls 97884->97887 97885->97884 97886 da6d3f 97885->97886 97888 da6d5a 97886->97888 97889 de4c9d 97886->97889 97893 da6d62 __fread_nolock 97887->97893 97900 da6f34 22 API calls 97888->97900 97890 dbfddb 22 API calls 97889->97890 97892 de4ca7 97890->97892 97894 dbfe0b 22 API calls 97892->97894 97893->97842 97895 de4cda 97894->97895 97897 daaec9 22 API calls 97896->97897 97898 da4c78 97897->97898 97898->97850 97898->97851 97899->97855 97900->97893 97902 dce684 ___scrt_is_nonwritable_in_current_image 97901->97902 97903 dce6aa 97902->97903 97904 dce695 97902->97904 97913 dce6a5 __fread_nolock 97903->97913 97914 dc918d EnterCriticalSection 97903->97914 97931 dcf2d9 20 API calls _free 97904->97931 97907 dce69a 97932 dd27ec 26 API calls _strftime 97907->97932 97909 dce6c6 97915 dce602 97909->97915 97911 dce6d1 97933 dce6ee LeaveCriticalSection __fread_nolock 97911->97933 97913->97613 97914->97909 97916 dce60f 97915->97916 97917 dce624 97915->97917 97966 dcf2d9 20 API calls _free 97916->97966 97922 dce61f 97917->97922 97934 dcdc0b 97917->97934 97919 dce614 97967 dd27ec 26 API calls _strftime 97919->97967 97922->97911 97927 dce646 97951 dd862f 97927->97951 97931->97907 97932->97913 97933->97913 97935 dcdc23 97934->97935 97939 dcdc1f 97934->97939 97936 dcd955 __fread_nolock 26 API calls 97935->97936 97935->97939 97937 dcdc43 97936->97937 97974 dd59be 97937->97974 97940 dd4d7a 97939->97940 97941 dd4d90 97940->97941 97943 dce640 97940->97943 97942 dd29c8 _free 20 API calls 97941->97942 97941->97943 97942->97943 97944 dcd955 97943->97944 97945 dcd976 97944->97945 97946 dcd961 97944->97946 97945->97927 98123 dcf2d9 20 API calls _free 97946->98123 97948 dcd966 98124 dd27ec 26 API calls _strftime 97948->98124 97950 dcd971 97950->97927 97952 dd863e 97951->97952 97953 dd8653 97951->97953 98128 dcf2c6 20 API calls _free 97952->98128 97954 dd868e 97953->97954 97959 dd867a 97953->97959 98130 dcf2c6 20 API calls _free 97954->98130 97956 dd8643 98129 dcf2d9 20 API calls _free 97956->98129 98125 dd8607 97959->98125 97960 dd8693 98131 dcf2d9 20 API calls _free 97960->98131 97963 dce64c 97963->97922 97968 dd29c8 97963->97968 97964 dd869b 98132 dd27ec 26 API calls _strftime 97964->98132 97966->97919 97967->97922 97969 dd29fc _free 97968->97969 97970 dd29d3 HeapFree 97968->97970 97969->97922 97970->97969 97971 dd29e8 97970->97971 98147 dcf2d9 20 API calls _free 97971->98147 97973 dd29ee GetLastError 97973->97969 97975 dd59ca ___scrt_is_nonwritable_in_current_image 97974->97975 97976 dd59ea 97975->97976 97977 dd59d2 97975->97977 97979 dd5a88 97976->97979 97983 dd5a1f 97976->97983 98053 dcf2c6 20 API calls _free 97977->98053 98058 dcf2c6 20 API calls _free 97979->98058 97980 dd59d7 98054 dcf2d9 20 API calls _free 97980->98054 97982 dd5a8d 98059 dcf2d9 20 API calls _free 97982->98059 97999 dd5147 EnterCriticalSection 97983->97999 97987 dd59df __fread_nolock 97987->97939 97988 dd5a95 98060 dd27ec 26 API calls _strftime 97988->98060 97989 dd5a25 97991 dd5a56 97989->97991 97992 dd5a41 97989->97992 98000 dd5aa9 97991->98000 98055 dcf2d9 20 API calls _free 97992->98055 97995 dd5a46 98056 dcf2c6 20 API calls _free 97995->98056 97996 dd5a51 98057 dd5a80 LeaveCriticalSection __wsopen_s 97996->98057 97999->97989 98001 dd5ad7 98000->98001 98040 dd5ad0 98000->98040 98002 dd5adb 98001->98002 98003 dd5afa 98001->98003 98068 dcf2c6 20 API calls _free 98002->98068 98006 dd5b4b 98003->98006 98007 dd5b2e 98003->98007 98004 dc0a8c CatchGuardHandler 5 API calls 98008 dd5cb1 98004->98008 98011 dd5b61 98006->98011 98074 dd9424 28 API calls __wsopen_s 98006->98074 98071 dcf2c6 20 API calls _free 98007->98071 98008->97996 98009 dd5ae0 98069 dcf2d9 20 API calls _free 98009->98069 98061 dd564e 98011->98061 98013 dd5b33 98072 dcf2d9 20 API calls _free 98013->98072 98015 dd5ae7 98070 dd27ec 26 API calls _strftime 98015->98070 98020 dd5b6f 98023 dd5b95 98020->98023 98024 dd5b73 98020->98024 98021 dd5ba8 98026 dd5bbc 98021->98026 98027 dd5c02 WriteFile 98021->98027 98022 dd5b3b 98073 dd27ec 26 API calls _strftime 98022->98073 98076 dd542e 45 API calls 3 library calls 98023->98076 98028 dd5c69 98024->98028 98075 dd55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 98024->98075 98031 dd5bc4 98026->98031 98032 dd5bf2 98026->98032 98030 dd5c25 GetLastError 98027->98030 98035 dd5b8b 98027->98035 98028->98040 98083 dcf2d9 20 API calls _free 98028->98083 98030->98035 98036 dd5bc9 98031->98036 98037 dd5be2 98031->98037 98079 dd56c4 7 API calls 2 library calls 98032->98079 98035->98028 98035->98040 98044 dd5c45 98035->98044 98036->98028 98042 dd5bd2 98036->98042 98078 dd5891 8 API calls 2 library calls 98037->98078 98039 dd5be0 98039->98035 98040->98004 98077 dd57a3 7 API calls 2 library calls 98042->98077 98043 dd5c8e 98084 dcf2c6 20 API calls _free 98043->98084 98047 dd5c4c 98044->98047 98048 dd5c60 98044->98048 98080 dcf2d9 20 API calls _free 98047->98080 98082 dcf2a3 20 API calls 2 library calls 98048->98082 98051 dd5c51 98081 dcf2c6 20 API calls _free 98051->98081 98053->97980 98054->97987 98055->97995 98056->97996 98057->97987 98058->97982 98059->97988 98060->97987 98085 ddf89b 98061->98085 98063 dd565e 98064 dd5663 98063->98064 98094 dd2d74 GetLastError 98063->98094 98064->98020 98064->98021 98066 dd5686 98066->98064 98067 dd56a4 GetConsoleMode 98066->98067 98067->98064 98068->98009 98069->98015 98070->98040 98071->98013 98072->98022 98073->98040 98074->98011 98075->98035 98076->98035 98077->98039 98078->98039 98079->98039 98080->98051 98081->98040 98082->98040 98083->98043 98084->98040 98086 ddf8a8 98085->98086 98087 ddf8b5 98085->98087 98115 dcf2d9 20 API calls _free 98086->98115 98089 ddf8c1 98087->98089 98116 dcf2d9 20 API calls _free 98087->98116 98089->98063 98091 ddf8ad 98091->98063 98092 ddf8e2 98117 dd27ec 26 API calls _strftime 98092->98117 98095 dd2d8a 98094->98095 98096 dd2d96 98094->98096 98118 dd320e 11 API calls 2 library calls 98095->98118 98119 dd4c7d 20 API calls _free 98096->98119 98099 dd2d90 98099->98096 98101 dd2ddf SetLastError 98099->98101 98100 dd2da2 98102 dd2daa 98100->98102 98120 dd3264 11 API calls 2 library calls 98100->98120 98101->98066 98104 dd29c8 _free 20 API calls 98102->98104 98106 dd2db0 98104->98106 98105 dd2dbf 98105->98102 98107 dd2dc6 98105->98107 98108 dd2deb SetLastError 98106->98108 98121 dd2be6 20 API calls _free 98107->98121 98122 dd28a7 38 API calls _abort 98108->98122 98111 dd2dd1 98115->98091 98116->98092 98117->98091 98118->98099 98119->98100 98120->98105 98121->98111 98123->97948 98124->97950 98133 dd8585 98125->98133 98127 dd862b 98127->97963 98128->97956 98129->97963 98130->97960 98131->97964 98132->97963 98134 dd8591 ___scrt_is_nonwritable_in_current_image 98133->98134 98144 dd5147 EnterCriticalSection 98134->98144 98136 dd859f 98137 dd85c6 98136->98137 98138 dd85d1 98136->98138 98140 dd86ae __wsopen_s 29 API calls 98137->98140 98145 dcf2d9 20 API calls _free 98138->98145 98141 dd85cc 98140->98141 98146 dd85fb LeaveCriticalSection __wsopen_s 98141->98146 98143 dd85ee __fread_nolock 98143->98127 98144->98136 98145->98141 98146->98143 98147->97973 98149 e0d4d5 98148->98149 98150 e0dbdc GetFileAttributesW 98148->98150 98149->97466 98150->98149 98151 e0dbe8 FindFirstFileW 98150->98151 98151->98149 98152 e0dbf9 FindClose 98151->98152 98152->98149 98154 da7510 53 API calls 98153->98154 98155 e27f90 98154->98155 98177 e27fd5 messages 98155->98177 98191 e28cd3 98155->98191 98157 e28281 98158 e2844f 98157->98158 98162 e2828f 98157->98162 98232 e28ee4 60 API calls 98158->98232 98161 e2845e 98161->98162 98163 e2846a 98161->98163 98204 e27e86 98162->98204 98163->98177 98164 da7510 53 API calls 98181 e28049 98164->98181 98169 e282c8 98219 dbfc70 98169->98219 98172 e28302 98226 da63eb 22 API calls 98172->98226 98173 e282e8 98225 e1359c 82 API calls __wsopen_s 98173->98225 98176 e28311 98227 da6a50 22 API calls 98176->98227 98177->97623 98178 e282f3 GetCurrentProcess TerminateProcess 98178->98172 98180 e2832a 98190 e28352 98180->98190 98228 db04f0 22 API calls 98180->98228 98181->98157 98181->98164 98181->98177 98223 e0417d 22 API calls __fread_nolock 98181->98223 98224 e2851d 42 API calls _strftime 98181->98224 98183 e284c5 98183->98177 98185 e284d9 FreeLibrary 98183->98185 98184 e28341 98229 e28b7b 75 API calls 98184->98229 98185->98177 98190->98183 98230 db04f0 22 API calls 98190->98230 98231 daaceb 23 API calls messages 98190->98231 98233 e28b7b 75 API calls 98190->98233 98192 daaec9 22 API calls 98191->98192 98193 e28cee CharLowerBuffW 98192->98193 98234 e08e54 98193->98234 98197 daa961 22 API calls 98198 e28d2a 98197->98198 98199 da6d25 22 API calls 98198->98199 98200 e28d3e 98199->98200 98201 da93b2 22 API calls 98200->98201 98203 e28d48 _wcslen 98201->98203 98202 e28e5e _wcslen 98202->98181 98203->98202 98241 e2851d 42 API calls _strftime 98203->98241 98205 e27ea1 98204->98205 98209 e27eec 98204->98209 98206 dbfe0b 22 API calls 98205->98206 98207 e27ec3 98206->98207 98208 dbfddb 22 API calls 98207->98208 98207->98209 98208->98207 98210 e29096 98209->98210 98211 e292ab messages 98210->98211 98218 e290ba _strcat _wcslen 98210->98218 98211->98169 98212 dab38f 39 API calls 98212->98218 98213 dab567 39 API calls 98213->98218 98214 dab6b5 39 API calls 98214->98218 98215 da7510 53 API calls 98215->98218 98216 dcea0c 21 API calls ___std_exception_copy 98216->98218 98218->98211 98218->98212 98218->98213 98218->98214 98218->98215 98218->98216 98244 e0efae 24 API calls _wcslen 98218->98244 98221 dbfc85 98219->98221 98220 dbfd1d VirtualAlloc 98222 dbfceb 98220->98222 98221->98220 98221->98222 98222->98172 98222->98173 98223->98181 98224->98181 98225->98178 98226->98176 98227->98180 98228->98184 98229->98190 98230->98190 98231->98190 98232->98161 98233->98190 98236 e08e74 _wcslen 98234->98236 98235 e08f63 98235->98197 98235->98203 98236->98235 98238 e08ea9 98236->98238 98240 e08f68 98236->98240 98238->98235 98242 dbce60 41 API calls 98238->98242 98240->98235 98243 dbce60 41 API calls 98240->98243 98241->98202 98242->98238 98243->98240 98244->98218 98287 da6270 98245->98287 98247 da9fd2 98293 daa4a1 22 API calls __fread_nolock 98247->98293 98249 da9fec 98249->97631 98251 da9eb5 98251->98247 98253 def7c4 98251->98253 98254 def699 98251->98254 98255 daa405 98251->98255 98259 daa6c3 22 API calls 98251->98259 98267 daa12c __fread_nolock 98251->98267 98268 daa587 22 API calls 98251->98268 98269 daaec9 22 API calls 98251->98269 98272 daa4a1 22 API calls 98251->98272 98292 da4573 41 API calls _wcslen 98251->98292 98295 da48c8 23 API calls 98251->98295 98296 da49bd 22 API calls __fread_nolock 98251->98296 98297 daa673 22 API calls 98251->98297 98298 e096e2 84 API calls __wsopen_s 98253->98298 98260 dbfddb 22 API calls 98254->98260 98255->98249 98300 e096e2 84 API calls __wsopen_s 98255->98300 98259->98251 98262 def754 98260->98262 98261 def7d2 98299 daa4a1 22 API calls __fread_nolock 98261->98299 98265 dbfe0b 22 API calls 98262->98265 98264 def7e8 98264->98249 98265->98267 98267->98253 98267->98255 98268->98251 98270 daa0db CharUpperBuffW 98269->98270 98294 daa673 22 API calls 98270->98294 98272->98251 98274 da9c7e 98273->98274 98275 def545 98273->98275 98279 dbfddb 22 API calls 98274->98279 98276 def556 98275->98276 98277 da6b57 22 API calls 98275->98277 98278 daa6c3 22 API calls 98276->98278 98277->98276 98280 def560 98278->98280 98281 da9c91 98279->98281 98280->98280 98282 da9c9a 98281->98282 98283 da9cac 98281->98283 98284 da9cb3 22 API calls 98282->98284 98285 daa961 22 API calls 98283->98285 98286 da9ca2 98284->98286 98285->98286 98286->97635 98288 dbfe0b 22 API calls 98287->98288 98289 da6295 98288->98289 98290 dbfddb 22 API calls 98289->98290 98291 da62a3 98290->98291 98291->98251 98292->98251 98293->98249 98294->98251 98295->98251 98296->98251 98297->98251 98298->98261 98299->98264 98300->98249 98302 dbf188 98301->98302 98303 dbf14c 98301->98303 98304 daa6c3 22 API calls 98302->98304 98303->98302 98305 dbf15b 98303->98305 98306 e0caeb 98304->98306 98307 dbf170 98305->98307 98308 dbf17d 98305->98308 98314 e0cb1a 98306->98314 98331 e0ca89 ReadFile SetFilePointerEx 98306->98331 98332 da49bd 22 API calls __fread_nolock 98306->98332 98323 dbf18e 98307->98323 98330 e0cbf2 26 API calls 98308->98330 98312 dbf179 98312->97674 98314->97674 98315->97686 98316->97684 98317->97687 98318->97691 98319->97643 98320->97643 98321->97677 98322->97681 98333 dbf1d8 98323->98333 98329 dbf1c1 98329->98312 98330->98312 98331->98306 98332->98306 98334 dbfe0b 22 API calls 98333->98334 98335 dbf1ef 98334->98335 98336 dbfddb 22 API calls 98335->98336 98337 dbf1a6 98336->98337 98338 da97b6 98337->98338 98345 da9a1e 98338->98345 98340 da97fc 98340->98329 98344 da6e14 24 API calls 98340->98344 98341 da9a40 2 API calls 98342 da97c7 98341->98342 98342->98340 98342->98341 98352 da9b01 22 API calls __fread_nolock 98342->98352 98344->98329 98346 da9a2f 98345->98346 98347 def378 98345->98347 98346->98342 98348 dbfddb 22 API calls 98347->98348 98349 def382 98348->98349 98350 dbfe0b 22 API calls 98349->98350 98351 def397 98350->98351 98352->98342 98486 da4e90 LoadLibraryA 98353->98486 98358 de3ccf 98361 da4f39 68 API calls 98358->98361 98359 da4ef6 LoadLibraryExW 98494 da4e59 LoadLibraryA 98359->98494 98363 de3cd6 98361->98363 98365 da4e59 3 API calls 98363->98365 98367 de3cde 98365->98367 98366 da4f20 98366->98367 98368 da4f2c 98366->98368 98516 da50f5 98367->98516 98370 da4f39 68 API calls 98368->98370 98372 da4f31 98370->98372 98372->97708 98372->97709 98484->97735 98485->97746 98487 da4ea8 GetProcAddress 98486->98487 98488 da4ec6 98486->98488 98489 da4eb8 98487->98489 98491 dce5eb 98488->98491 98489->98488 98490 da4ebf FreeLibrary 98489->98490 98490->98488 98524 dce52a 98491->98524 98493 da4eea 98493->98358 98493->98359 98495 da4e6e GetProcAddress 98494->98495 98496 da4e8d 98494->98496 98497 da4e7e 98495->98497 98499 da4f80 98496->98499 98497->98496 98498 da4e86 FreeLibrary 98497->98498 98498->98496 98500 dbfe0b 22 API calls 98499->98500 98501 da4f95 98500->98501 98502 da5722 22 API calls 98501->98502 98503 da4fa1 __fread_nolock 98502->98503 98504 de3d1d 98503->98504 98505 da50a5 98503->98505 98515 da4fdc 98503->98515 98588 e1304d 74 API calls 98504->98588 98577 da42a2 CreateStreamOnHGlobal 98505->98577 98508 de3d22 98510 da511f 64 API calls 98508->98510 98509 da50f5 40 API calls 98509->98515 98511 de3d45 98510->98511 98512 da50f5 40 API calls 98511->98512 98514 da506e messages 98512->98514 98514->98366 98515->98508 98515->98509 98515->98514 98583 da511f 98515->98583 98517 da5107 98516->98517 98518 de3d70 98516->98518 98610 dce8c4 98517->98610 98521 e128fe 98739 e1274e 98521->98739 98526 dce536 ___scrt_is_nonwritable_in_current_image 98524->98526 98525 dce544 98549 dcf2d9 20 API calls _free 98525->98549 98526->98525 98529 dce574 98526->98529 98528 dce549 98550 dd27ec 26 API calls _strftime 98528->98550 98531 dce579 98529->98531 98532 dce586 98529->98532 98551 dcf2d9 20 API calls _free 98531->98551 98541 dd8061 98532->98541 98535 dce58f 98536 dce595 98535->98536 98537 dce5a2 98535->98537 98552 dcf2d9 20 API calls _free 98536->98552 98553 dce5d4 LeaveCriticalSection __fread_nolock 98537->98553 98540 dce554 __fread_nolock 98540->98493 98542 dd806d ___scrt_is_nonwritable_in_current_image 98541->98542 98554 dd2f5e EnterCriticalSection 98542->98554 98544 dd807b 98555 dd80fb 98544->98555 98548 dd80ac __fread_nolock 98548->98535 98549->98528 98550->98540 98551->98540 98552->98540 98553->98540 98554->98544 98563 dd811e 98555->98563 98556 dd8177 98574 dd4c7d 20 API calls _free 98556->98574 98558 dd8180 98560 dd29c8 _free 20 API calls 98558->98560 98561 dd8189 98560->98561 98562 dd3405 __wsopen_s 11 API calls 98561->98562 98564 dd8088 98561->98564 98565 dd81a8 98562->98565 98563->98556 98563->98564 98572 dc918d EnterCriticalSection 98563->98572 98573 dc91a1 LeaveCriticalSection 98563->98573 98569 dd80b7 98564->98569 98575 dc918d EnterCriticalSection 98565->98575 98568 dd81bb 98568->98564 98576 dd2fa6 LeaveCriticalSection 98569->98576 98571 dd80be 98571->98548 98572->98563 98573->98563 98574->98558 98575->98568 98576->98571 98578 da42bc FindResourceExW 98577->98578 98582 da42d9 98577->98582 98579 de35ba LoadResource 98578->98579 98578->98582 98580 de35cf SizeofResource 98579->98580 98579->98582 98581 de35e3 LockResource 98580->98581 98580->98582 98581->98582 98582->98515 98584 da512e 98583->98584 98587 de3d90 98583->98587 98589 dcece3 98584->98589 98588->98508 98592 dceaaa 98589->98592 98591 da513c 98591->98515 98594 dceab6 ___scrt_is_nonwritable_in_current_image 98592->98594 98593 dceac2 98605 dcf2d9 20 API calls _free 98593->98605 98594->98593 98595 dceae8 98594->98595 98607 dc918d EnterCriticalSection 98595->98607 98597 dceac7 98606 dd27ec 26 API calls _strftime 98597->98606 98600 dceaf4 98608 dcec0a 62 API calls 2 library calls 98600->98608 98602 dceb08 98609 dceb27 LeaveCriticalSection __fread_nolock 98602->98609 98604 dcead2 __fread_nolock 98604->98591 98605->98597 98606->98604 98607->98600 98608->98602 98609->98604 98613 dce8e1 98610->98613 98612 da5118 98612->98521 98614 dce8ed ___scrt_is_nonwritable_in_current_image 98613->98614 98615 dce92d 98614->98615 98616 dce900 ___scrt_fastfail 98614->98616 98625 dce925 __fread_nolock 98614->98625 98626 dc918d EnterCriticalSection 98615->98626 98640 dcf2d9 20 API calls _free 98616->98640 98619 dce937 98627 dce6f8 98619->98627 98621 dce91a 98641 dd27ec 26 API calls _strftime 98621->98641 98625->98612 98626->98619 98631 dce70a ___scrt_fastfail 98627->98631 98633 dce727 98627->98633 98628 dce717 98708 dcf2d9 20 API calls _free 98628->98708 98630 dce71c 98709 dd27ec 26 API calls _strftime 98630->98709 98631->98628 98631->98633 98638 dce76a __fread_nolock 98631->98638 98642 dce96c LeaveCriticalSection __fread_nolock 98633->98642 98634 dce886 ___scrt_fastfail 98711 dcf2d9 20 API calls _free 98634->98711 98636 dcd955 __fread_nolock 26 API calls 98636->98638 98638->98633 98638->98634 98638->98636 98643 dd8d45 98638->98643 98710 dccf78 26 API calls 4 library calls 98638->98710 98640->98621 98641->98625 98642->98625 98644 dd8d6f 98643->98644 98645 dd8d57 98643->98645 98647 dd90d9 98644->98647 98652 dd8db4 98644->98652 98712 dcf2c6 20 API calls _free 98645->98712 98734 dcf2c6 20 API calls _free 98647->98734 98648 dd8d5c 98657 dd8d64 98652->98657 98657->98638 98708->98630 98709->98633 98710->98638 98711->98630 98712->98648 98742 dce4e8 98739->98742 98741 e1275d 98745 dce469 98742->98745 98744 dce505 98744->98741 98746 dce48c 98745->98746 98747 dce478 98745->98747 98751 dce488 __alldvrm 98746->98751 98753 dd333f 98746->98753 98760 dcf2d9 20 API calls _free 98747->98760 98750 dce47d 98751->98744 98754 dd2fd7 _free 5 API calls 98753->98754 98755 dd3366 98754->98755 98760->98750 98892 daae01 98891->98892 98895 daae1c messages 98891->98895 98893 daaec9 22 API calls 98892->98893 98894 daae09 CharUpperBuffW 98893->98894 98894->98895 98895->97480 98897 daacae 98896->98897 98899 daacd1 98897->98899 98926 e1359c 82 API calls __wsopen_s 98897->98926 98899->97533 98901 defadb 98900->98901 98902 daad92 98900->98902 98903 dbfddb 22 API calls 98902->98903 98904 daad99 98903->98904 98927 daadcd 98904->98927 98907->97530 98908->97534 98909->97534 98910->97483 98911->97522 98912->97498 98913->97522 98914->97522 98915->97533 98916->97533 98917->97533 98918->97533 98919->97533 98920->97533 98921->97511 98922->97522 98923->97519 98924->97526 98925->97522 98926->98899 98930 daaddd 98927->98930 98928 daadb6 98928->97533 98929 dbfddb 22 API calls 98929->98930 98930->98928 98930->98929 98931 daa961 22 API calls 98930->98931 98932 daa8c7 22 API calls 98930->98932 98933 daadcd 22 API calls 98930->98933 98931->98930 98932->98930 98933->98930

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 234 da42de-da434d call daa961 GetVersionExW call da6b57 239 de3617-de362a 234->239 240 da4353 234->240 242 de362b-de362f 239->242 241 da4355-da4357 240->241 243 da435d-da43bc call da93b2 call da37a0 241->243 244 de3656 241->244 245 de3632-de363e 242->245 246 de3631 242->246 263 de37df-de37e6 243->263 264 da43c2-da43c4 243->264 249 de365d-de3660 244->249 245->242 248 de3640-de3642 245->248 246->245 248->241 251 de3648-de364f 248->251 252 da441b-da4435 GetCurrentProcess IsWow64Process 249->252 253 de3666-de36a8 249->253 251->239 255 de3651 251->255 258 da4437 252->258 259 da4494-da449a 252->259 253->252 256 de36ae-de36b1 253->256 255->244 261 de36db-de36e5 256->261 262 de36b3-de36bd 256->262 260 da443d-da4449 258->260 259->260 265 da444f-da445e LoadLibraryA 260->265 266 de3824-de3828 GetSystemInfo 260->266 270 de36f8-de3702 261->270 271 de36e7-de36f3 261->271 267 de36bf-de36c5 262->267 268 de36ca-de36d6 262->268 272 de37e8 263->272 273 de3806-de3809 263->273 264->249 269 da43ca-da43dd 264->269 274 da449c-da44a6 GetSystemInfo 265->274 275 da4460-da446e GetProcAddress 265->275 267->252 268->252 276 de3726-de372f 269->276 277 da43e3-da43e5 269->277 279 de3704-de3710 270->279 280 de3715-de3721 270->280 271->252 278 de37ee 272->278 281 de380b-de381a 273->281 282 de37f4-de37fc 273->282 285 da4476-da4478 274->285 275->274 284 da4470-da4474 GetNativeSystemInfo 275->284 288 de373c-de3748 276->288 289 de3731-de3737 276->289 286 da43eb-da43ee 277->286 287 de374d-de3762 277->287 278->282 279->252 280->252 281->278 283 de381c-de3822 281->283 282->273 283->282 284->285 292 da447a-da447b FreeLibrary 285->292 293 da4481-da4493 285->293 294 da43f4-da440f 286->294 295 de3791-de3794 286->295 290 de376f-de377b 287->290 291 de3764-de376a 287->291 288->252 289->252 290->252 291->252 292->293 297 de3780-de378c 294->297 298 da4415 294->298 295->252 296 de379a-de37c1 295->296 299 de37ce-de37da 296->299 300 de37c3-de37c9 296->300 297->252 298->252 299->252 300->252
                    APIs
                    • GetVersionExW.KERNEL32(?), ref: 00DA430D
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                    • GetCurrentProcess.KERNEL32(?,00E3CB64,00000000,?,?), ref: 00DA4422
                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 00DA4429
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00DA4454
                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo,?,?), ref: 00DA4466
                    • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00DA4474
                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 00DA447B
                    • GetSystemInfo.KERNEL32(?,?,?), ref: 00DA44A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                    • API String ID: 3290436268-3101561225
                    • Opcode ID: 345a2752391ec3c1568dfe8c7da44003a2c2e69d402b42106b5705ba17af7c05
                    • Instruction ID: 68a3dddd1bebca4bcd991417e1230da071a3fbec98ac3952d4e2c8dd8b10b732
                    • Opcode Fuzzy Hash: 345a2752391ec3c1568dfe8c7da44003a2c2e69d402b42106b5705ba17af7c05
                    • Instruction Fuzzy Hash: E4A1957191A3C0FFC711DB7F7C451A57FA46B66300B1A58E9E08DB7AA1D2A0858CCB71

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1377 da42a2-da42ba CreateStreamOnHGlobal 1378 da42da-da42dd 1377->1378 1379 da42bc-da42d3 FindResourceExW 1377->1379 1380 da42d9 1379->1380 1381 de35ba-de35c9 LoadResource 1379->1381 1380->1378 1381->1380 1382 de35cf-de35dd SizeofResource 1381->1382 1382->1380 1383 de35e3-de35ee LockResource 1382->1383 1383->1380 1384 de35f4-de3612 1383->1384 1384->1380
                    APIs
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00DA42B2
                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00DA50AA,?,?,00000000,00000000), ref: 00DA42C9
                    • LoadResource.KERNEL32(?,00000000,?,?,00DA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F20), ref: 00DE35BE
                    • SizeofResource.KERNEL32(?,00000000,?,?,00DA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F20), ref: 00DE35D3
                    • LockResource.KERNEL32(00DA50AA,?,?,00DA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F20,?), ref: 00DE35E6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                    • String ID: SCRIPT
                    • API String ID: 3051347437-3967369404
                    • Opcode ID: 81cc55a1ff8fda51e5dca5dc3bd7e6deb3a8d1ea3e806a25a226b36db364006b
                    • Instruction ID: cdd69f274272b7d61d4adf7a78a65c5f886db505d2cff57c6af1a9093634dda6
                    • Opcode Fuzzy Hash: 81cc55a1ff8fda51e5dca5dc3bd7e6deb3a8d1ea3e806a25a226b36db364006b
                    • Instruction Fuzzy Hash: 56117C72241704BFD7218B66DC4CF277BB9EBC6B51F244169B502A6260DBB1D8048730

                    Control-flow Graph

                    APIs
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00DA2B6B
                      • Part of subcall function 00DA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E71418,?,00DA2E7F,?,?,?,00000000), ref: 00DA3A78
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • GetForegroundWindow.USER32 ref: 00DE2C10
                    • ShellExecuteW.SHELL32(00000000,?,?,00E62224), ref: 00DE2C17
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                    • String ID: runas
                    • API String ID: 448630720-4000483414
                    • Opcode ID: ab9a2503d04c7b40f45ee19ff4f470debc04c1fbbcef2988436d8d16101bccf8
                    • Instruction ID: 074283ca5f5b49e615399981bb8b0e1842264517bba300b1219876c3008c3d00
                    • Opcode Fuzzy Hash: ab9a2503d04c7b40f45ee19ff4f470debc04c1fbbcef2988436d8d16101bccf8
                    • Instruction Fuzzy Hash: DA11B4312083455FCB04FF69E8569BEBBA5DBD7350F08546DF196620A2DF20894D8732
                    APIs
                    • lstrlenW.KERNEL32(?,00DE5222), ref: 00E0DBCE
                    • GetFileAttributesW.KERNELBASE(?), ref: 00E0DBDD
                    • FindFirstFileW.KERNELBASE(?,?), ref: 00E0DBEE
                    • FindClose.KERNEL32(00000000), ref: 00E0DBFA
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FileFind$AttributesCloseFirstlstrlen
                    • String ID:
                    • API String ID: 2695905019-0
                    • Opcode ID: 76a20bc4caaa99629da97ae4dc3ce7c2292d9b80d7568075d82aa5859a08190a
                    • Instruction ID: 24f05b5d69242076aaca27bffb1dd04d4964a41f2891dea2a7b85dc4201e81dc
                    • Opcode Fuzzy Hash: 76a20bc4caaa99629da97ae4dc3ce7c2292d9b80d7568075d82aa5859a08190a
                    • Instruction Fuzzy Hash: 37F0A7314149285BD2206BF89C4D4AB7F6C9F01334B204742F835F20F0EBB099988795
                    APIs
                    • GetSystemTimeAsFileTime.KERNEL32(00000000,00DCE505), ref: 00DD337E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Time$FileSystem
                    • String ID: GetSystemTimePreciseAsFileTime
                    • API String ID: 2086374402-595813830
                    • Opcode ID: 70f473aa354b17cc30649f016d6b8b7d4a77f11fe76e289ec84f94b28dadaec9
                    • Instruction ID: 7c66a1fd16f017dcf2d102b0a7673cc5a8b604ba3ff3c9f3496ff511dba4d157
                    • Opcode Fuzzy Hash: 70f473aa354b17cc30649f016d6b8b7d4a77f11fe76e289ec84f94b28dadaec9
                    • Instruction Fuzzy Hash: 05E0E531A40318BFD3106BA6AC06E7EBF90DF54B50B94026DF9057B661CDA18E0097EA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: BuffCharUpper
                    • String ID: p#
                    • API String ID: 3964851224-4182048217
                    • Opcode ID: 211d79cd88735d76eea63641af4fa396256ac3e5e9741da6d84b9f1fae5c6804
                    • Instruction ID: 73a26ecfcb72c8633178d6e11ee7dd096905af367a1dfe91ab307a5f4052a537
                    • Opcode Fuzzy Hash: 211d79cd88735d76eea63641af4fa396256ac3e5e9741da6d84b9f1fae5c6804
                    • Instruction Fuzzy Hash: 00A24A706083019FD710DF28C480B6ABBE1FF89314F19996DE99A9B352D771EC45CBA2
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32 ref: 00DC09DA
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: e2c65098ee22e7f9032aed60c4d135f5a5ff7cf5302d1c5176fc2165e851ee6f
                    • Instruction ID: 077aa4e5ca2a7d0961c598a72bd38f2733319bc3484ace5ffcb6fd596289610f
                    • Opcode Fuzzy Hash: e2c65098ee22e7f9032aed60c4d135f5a5ff7cf5302d1c5176fc2165e851ee6f
                    • Instruction Fuzzy Hash:
                    APIs
                    • GetInputState.USER32 ref: 00DAD807
                    • timeGetTime.WINMM ref: 00DADA07
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DADB28
                    • TranslateMessage.USER32(?), ref: 00DADB7B
                    • DispatchMessageW.USER32(?), ref: 00DADB89
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DADB9F
                    • Sleep.KERNEL32(0000000A), ref: 00DADBB1
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                    • String ID:
                    • API String ID: 2189390790-0
                    • Opcode ID: 48d49e53e934681f95c6810fdbaad83df0be917956860538ee972b1562c902cd
                    • Instruction ID: 04e3b29bb7150543f866aef62541bef43262d2145b960648e9cee9a04e5e78ec
                    • Opcode Fuzzy Hash: 48d49e53e934681f95c6810fdbaad83df0be917956860538ee972b1562c902cd
                    • Instruction Fuzzy Hash: DC42DE30604345EFD728CF24C884BBAB7E2FF46314F198559E59A976A1D770E884CBB2

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00DA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E71418,?,00DA2E7F,?,?,?,00000000), ref: 00DA3A78
                      • Part of subcall function 00DA3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00DA3379
                    • RegOpenKeyExW.KERNEL32 ref: 00DA356A
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DE318D
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?), ref: 00DE31CE
                    • RegCloseKey.ADVAPI32(?), ref: 00DE3210
                    • _wcslen.LIBCMT ref: 00DE3277
                    • _wcslen.LIBCMT ref: 00DE3286
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\$`jy
                    • API String ID: 98802146-4128117543
                    • Opcode ID: 2d26be119523d8d1b1a82997f1f2b3d5e12e0ffb717ac716cc8639491b4dcab9
                    • Instruction ID: a229cff382ddeda230d0c818ff88c79b5d41f44c0977636d5e6a6a11d62d9d15
                    • Opcode Fuzzy Hash: 2d26be119523d8d1b1a82997f1f2b3d5e12e0ffb717ac716cc8639491b4dcab9
                    • Instruction Fuzzy Hash: 6271A471404302AEC314EF66DC8696BBBE8FF95350F50482DF689A71A0DB74DA88CB71

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 371 de065b-de068b call de042f 374 de068d-de0698 call dcf2c6 371->374 375 de06a6-de06b2 call dd5221 371->375 382 de069a-de06a1 call dcf2d9 374->382 380 de06cb-de0714 call de039a 375->380 381 de06b4-de06c9 call dcf2c6 call dcf2d9 375->381 390 de0716-de071f 380->390 391 de0781-de078a GetFileType 380->391 381->382 392 de097d-de0983 382->392 396 de0756-de077c GetLastError call dcf2a3 390->396 397 de0721-de0725 390->397 393 de078c-de07bd GetLastError call dcf2a3 CloseHandle 391->393 394 de07d3-de07d6 391->394 393->382 408 de07c3-de07ce call dcf2d9 393->408 399 de07df-de07e5 394->399 400 de07d8-de07dd 394->400 396->382 397->396 401 de0727-de0754 call de039a 397->401 404 de07e9-de0837 call dd516a 399->404 405 de07e7 399->405 400->404 401->391 401->396 414 de0839-de0845 call de05ab 404->414 415 de0847-de086b call de014d 404->415 405->404 408->382 414->415 420 de086f-de0879 call dd86ae 414->420 421 de087e-de08c1 415->421 422 de086d 415->422 420->392 424 de08e2-de08f0 421->424 425 de08c3-de08c7 421->425 422->420 428 de097b 424->428 429 de08f6-de08fa 424->429 425->424 427 de08c9-de08dd 425->427 427->424 428->392 429->428 430 de08fc-de092f CloseHandle call de039a 429->430 433 de0963-de0977 430->433 434 de0931-de095d GetLastError call dcf2a3 call dd5333 430->434 433->428 434->433
                    APIs
                      • Part of subcall function 00DE039A: CreateFileW.KERNELBASE(00000000,00000000,?,00DE0704,?,?,00000000), ref: 00DE03B7
                    • GetLastError.KERNEL32 ref: 00DE076F
                    • __dosmaperr.LIBCMT ref: 00DE0776
                    • GetFileType.KERNELBASE ref: 00DE0782
                    • GetLastError.KERNEL32 ref: 00DE078C
                    • __dosmaperr.LIBCMT ref: 00DE0795
                    • CloseHandle.KERNEL32(00000000), ref: 00DE07B5
                    • CloseHandle.KERNEL32(?), ref: 00DE08FF
                    • GetLastError.KERNEL32 ref: 00DE0931
                    • __dosmaperr.LIBCMT ref: 00DE0938
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                    • String ID: H
                    • API String ID: 4237864984-2852464175
                    • Opcode ID: 42785f2fb8c79f590c15fee263efa6fabfcc7294caeada25b4e87db0f0eb3f81
                    • Instruction ID: c72c37cffd17dd6de633342318bdcf442364b32e4b0e9d704d04944281762345
                    • Opcode Fuzzy Hash: 42785f2fb8c79f590c15fee263efa6fabfcc7294caeada25b4e87db0f0eb3f81
                    • Instruction Fuzzy Hash: 39A10432A001898FDF19FF69D891BAD7FA1EB06320F28015DF815EB391C6719856CBB1

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32 ref: 00DA2B8E
                    • LoadCursorW.USER32 ref: 00DA2B9D
                    • LoadIconW.USER32 ref: 00DA2BB3
                    • LoadIconW.USER32 ref: 00DA2BC5
                    • LoadIconW.USER32 ref: 00DA2BD7
                    • LoadImageW.USER32 ref: 00DA2BEF
                    • RegisterClassExW.USER32(?), ref: 00DA2C40
                      • Part of subcall function 00DA2CD4: GetSysColorBrush.USER32 ref: 00DA2D07
                      • Part of subcall function 00DA2CD4: RegisterClassExW.USER32(00000030), ref: 00DA2D31
                      • Part of subcall function 00DA2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA2D42
                      • Part of subcall function 00DA2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00DA2D5F
                      • Part of subcall function 00DA2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DA2D6F
                      • Part of subcall function 00DA2CD4: LoadIconW.USER32 ref: 00DA2D85
                      • Part of subcall function 00DA2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DA2D94
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                    • String ID: #$0$AutoIt v3
                    • API String ID: 423443420-4155596026
                    • Opcode ID: 535b021366120502d54a551ec127da39928c985cf8a561056f32deaab6374896
                    • Instruction ID: c1477a101ab82dab99161d8009a1d19bdedd702b6da57ed6c1a29b99d5ad11b9
                    • Opcode Fuzzy Hash: 535b021366120502d54a551ec127da39928c985cf8a561056f32deaab6374896
                    • Instruction Fuzzy Hash: 03212571A00318BFDB10DFABEC49BA97FB4FB48B50F11009AE508B66A0D3B14598DF90
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 00DABB4E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Init_thread_footer
                    • String ID: p#$p#$p#$p#$p%$p%$x#$x#
                    • API String ID: 1385522511-4136154834
                    • Opcode ID: 9a2e84ef201e34da615789fd32f7e861afec190dc471158a31b241a68e349833
                    • Instruction ID: c0d71db7775169551f23bc274c47eee7e6eb482e677abc7d37f6173a802a10e6
                    • Opcode Fuzzy Hash: 9a2e84ef201e34da615789fd32f7e861afec190dc471158a31b241a68e349833
                    • Instruction Fuzzy Hash: 8232B235A00209DFDB14CF54C894ABEBBF5EF45320F19805AEA45AB252D774ED82CBB1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 649 da3170-da3185 650 da3187-da318a 649->650 651 da31e5-da31e7 649->651 652 da31eb 650->652 653 da318c-da3193 650->653 651->650 654 da31e9 651->654 658 de2dfb-de2e23 call da18e2 call dbe499 652->658 659 da31f1-da31f6 652->659 655 da3199-da319e 653->655 656 da3265-da326d PostQuitMessage 653->656 657 da31d0-da31d8 DefWindowProcW 654->657 661 de2e7c-de2e90 call e0bf30 655->661 662 da31a4-da31a8 655->662 664 da3219-da321b 656->664 663 da31de-da31e4 657->663 694 de2e28-de2e2f 658->694 665 da31f8-da31fb 659->665 666 da321d-da3244 SetTimer RegisterWindowMessageW 659->666 661->664 688 de2e96 661->688 670 da31ae-da31b3 662->670 671 de2e68-de2e77 call e0c161 662->671 664->663 667 de2d9c-de2d9f 665->667 668 da3201-da3214 KillTimer call da30f2 call da3c50 665->668 666->664 672 da3246-da3251 CreatePopupMenu 666->672 680 de2dd7-de2df6 MoveWindow 667->680 681 de2da1-de2da5 667->681 668->664 677 de2e4d-de2e54 670->677 678 da31b9-da31be 670->678 671->664 672->664 677->657 682 de2e5a-de2e63 call e00ad7 677->682 686 da3253-da3263 call da326f 678->686 687 da31c4-da31ca 678->687 680->664 689 de2dc6-de2dd2 SetFocus 681->689 690 de2da7-de2daa 681->690 682->657 686->664 687->657 687->694 688->657 689->664 690->687 695 de2db0-de2dc1 call da18e2 690->695 694->657 698 de2e35-de2e48 call da30f2 call da3837 694->698 695->664 698->657
                    APIs
                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00DA316A,?,?), ref: 00DA31D8
                    • KillTimer.USER32 ref: 00DA3204
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DA3227
                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00DA316A,?,?), ref: 00DA3232
                    • CreatePopupMenu.USER32 ref: 00DA3246
                    • PostQuitMessage.USER32 ref: 00DA3267
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                    • String ID: TaskbarCreated
                    • API String ID: 129472671-2362178303
                    • Opcode ID: 3d6005bfdeb8c00157f91e9cec291129039529f66872b03b7c0c971571e80fb3
                    • Instruction ID: 2e19093e80e9a4e3ad11e585e80ebd7c754671998de368034cc96482d1ea87ea
                    • Opcode Fuzzy Hash: 3d6005bfdeb8c00157f91e9cec291129039529f66872b03b7c0c971571e80fb3
                    • Instruction Fuzzy Hash: 7C413732240304BFDB146B7D9C0EB793A5BEB87340F184166FA4AB61E1DB71CA8497B5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: D%$D%$D%$D%$D%$Variable must be of type 'Object'.
                    • API String ID: 0-2799515523
                    • Opcode ID: dd29a5c4e86827d2c89d062cba678a362b6878ab5e872f569020673af1053d9b
                    • Instruction ID: 879432968f30a7dd0a7961d92ed066cb531b3af57e916eaf303678fe80569403
                    • Opcode Fuzzy Hash: dd29a5c4e86827d2c89d062cba678a362b6878ab5e872f569020673af1053d9b
                    • Instruction Fuzzy Hash: B3C28A71A00215CFCB24CF68C880AADB7B1FF4A310F298569E956AB391D775ED41CBB1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1215 dd8d45-dd8d55 1216 dd8d6f-dd8d71 1215->1216 1217 dd8d57-dd8d6a call dcf2c6 call dcf2d9 1215->1217 1219 dd90d9-dd90e6 call dcf2c6 call dcf2d9 1216->1219 1220 dd8d77-dd8d7d 1216->1220 1231 dd90f1 1217->1231 1238 dd90ec call dd27ec 1219->1238 1220->1219 1223 dd8d83-dd8dae 1220->1223 1223->1219 1226 dd8db4-dd8dbd 1223->1226 1229 dd8dbf-dd8dd2 call dcf2c6 call dcf2d9 1226->1229 1230 dd8dd7-dd8dd9 1226->1230 1229->1238 1234 dd8ddf-dd8de3 1230->1234 1235 dd90d5-dd90d7 1230->1235 1237 dd90f4-dd90f9 1231->1237 1234->1235 1236 dd8de9-dd8ded 1234->1236 1235->1237 1236->1229 1240 dd8def-dd8e06 1236->1240 1238->1231 1243 dd8e08-dd8e0b 1240->1243 1244 dd8e23-dd8e2c 1240->1244 1246 dd8e0d-dd8e13 1243->1246 1247 dd8e15-dd8e1e 1243->1247 1248 dd8e2e-dd8e45 call dcf2c6 call dcf2d9 call dd27ec 1244->1248 1249 dd8e4a-dd8e54 1244->1249 1246->1247 1246->1248 1250 dd8ebf-dd8ed9 1247->1250 1280 dd900c 1248->1280 1252 dd8e5b-dd8e79 call dd3820 call dd29c8 * 2 1249->1252 1253 dd8e56-dd8e58 1249->1253 1256 dd8fad-dd8fb6 call ddf89b 1250->1256 1257 dd8edf-dd8eef 1250->1257 1284 dd8e7b-dd8e91 call dcf2d9 call dcf2c6 1252->1284 1285 dd8e96-dd8ebc call dd9424 1252->1285 1253->1252 1269 dd9029 1256->1269 1270 dd8fb8-dd8fca 1256->1270 1257->1256 1258 dd8ef5-dd8ef7 1257->1258 1258->1256 1262 dd8efd-dd8f23 1258->1262 1262->1256 1266 dd8f29-dd8f3c 1262->1266 1266->1256 1271 dd8f3e-dd8f40 1266->1271 1273 dd902d-dd9045 ReadFile 1269->1273 1270->1269 1275 dd8fcc-dd8fdb GetConsoleMode 1270->1275 1271->1256 1276 dd8f42-dd8f6d 1271->1276 1278 dd9047-dd904d 1273->1278 1279 dd90a1-dd90ac GetLastError 1273->1279 1275->1269 1281 dd8fdd-dd8fe1 1275->1281 1276->1256 1283 dd8f6f-dd8f82 1276->1283 1278->1279 1288 dd904f 1278->1288 1286 dd90ae-dd90c0 call dcf2d9 call dcf2c6 1279->1286 1287 dd90c5-dd90c8 1279->1287 1282 dd900f-dd9019 call dd29c8 1280->1282 1281->1273 1289 dd8fe3-dd8ffd ReadConsoleW 1281->1289 1282->1237 1283->1256 1293 dd8f84-dd8f86 1283->1293 1284->1280 1285->1250 1286->1280 1290 dd90ce-dd90d0 1287->1290 1291 dd9005-dd900b call dcf2a3 1287->1291 1297 dd9052-dd9064 1288->1297 1298 dd8fff GetLastError 1289->1298 1299 dd901e-dd9027 1289->1299 1290->1282 1291->1280 1293->1256 1302 dd8f88-dd8fa8 1293->1302 1297->1282 1306 dd9066-dd906a 1297->1306 1298->1291 1299->1297 1302->1256 1310 dd906c-dd907c call dd8a61 1306->1310 1311 dd9083-dd908e 1306->1311 1320 dd907f-dd9081 1310->1320 1312 dd909a-dd909f call dd88a1 1311->1312 1313 dd9090 call dd8bb1 1311->1313 1321 dd9095-dd9098 1312->1321 1313->1321 1320->1282 1321->1320
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e9d98757b6db5f4b59693445e970225e9c974f82e000764fafd3f35911c44349
                    • Instruction ID: 0125b20b0c57e27bb6fad9226db9954d59e069cbac96c5b6abb11a91140ea2d4
                    • Opcode Fuzzy Hash: e9d98757b6db5f4b59693445e970225e9c974f82e000764fafd3f35911c44349
                    • Instruction Fuzzy Hash: 46C1E074A0434AAFDF22DFA8D851BBDBBB1AF09310F18409AF458A7392C7319941DB71

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1323 1625d0-16267e call 160000 1326 162685-1626ab call 1634e0 CreateFileW 1323->1326 1329 1626b2-1626c2 1326->1329 1330 1626ad 1326->1330 1335 1626c4 1329->1335 1336 1626c9-1626e3 VirtualAlloc 1329->1336 1331 1627fd-162801 1330->1331 1333 162843-162846 1331->1333 1334 162803-162807 1331->1334 1337 162849-162850 1333->1337 1338 162813-162817 1334->1338 1339 162809-16280c 1334->1339 1335->1331 1340 1626e5 1336->1340 1341 1626ea-162701 ReadFile 1336->1341 1342 1628a5-1628ba 1337->1342 1343 162852-16285d 1337->1343 1344 162827-16282b 1338->1344 1345 162819-162823 1338->1345 1339->1338 1340->1331 1350 162703 1341->1350 1351 162708-162748 VirtualAlloc 1341->1351 1346 1628bc-1628c7 VirtualFree 1342->1346 1347 1628ca-1628d2 1342->1347 1352 162861-16286d 1343->1352 1353 16285f 1343->1353 1348 16282d-162837 1344->1348 1349 16283b 1344->1349 1345->1344 1346->1347 1348->1349 1349->1333 1350->1331 1354 16274f-16276a call 163730 1351->1354 1355 16274a 1351->1355 1356 162881-16288d 1352->1356 1357 16286f-16287f 1352->1357 1353->1342 1363 162775-16277f 1354->1363 1355->1331 1360 16288f-162898 1356->1360 1361 16289a-1628a0 1356->1361 1359 1628a3 1357->1359 1359->1337 1360->1359 1361->1359 1364 1627b2-1627c6 call 163540 1363->1364 1365 162781-1627b0 call 163730 1363->1365 1371 1627ca-1627ce 1364->1371 1372 1627c8 1364->1372 1365->1363 1373 1627d0-1627d4 CloseHandle 1371->1373 1374 1627da-1627de 1371->1374 1372->1331 1373->1374 1375 1627e0-1627eb VirtualFree 1374->1375 1376 1627ee-1627f7 1374->1376 1375->1376 1376->1326 1376->1331
                    APIs
                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 001626A1
                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001628C7
                    Memory Dump Source
                    • Source File: 00000000.00000002.354887863.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_160000_New order.jbxd
                    Similarity
                    • API ID: CreateFileFreeVirtual
                    • String ID:
                    • API String ID: 204039940-0
                    • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                    • Instruction ID: 21cb8a1e670902eb58f914795821c59b18fa9370cf95ecfc2677a5765edc9c16
                    • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                    • Instruction Fuzzy Hash: CFA11574E00209EBDB14CFA4C894FEEBBB5BF58304F208159E511BB280D7799A90DBA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1387 da2c63-da2cd3 CreateWindowExW * 2 ShowWindow * 2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$CreateShow
                    • String ID: AutoIt v3$edit
                    • API String ID: 1584632944-3779509399
                    • Opcode ID: edeccc5676e5e0c21cd081f5f510718418c4e294f2ec520e7eb2020db7996e29
                    • Instruction ID: f1bfe3012f00c07a5ca83f00140b65da68ae0c1505155d2505a8fb8992eae281
                    • Opcode Fuzzy Hash: edeccc5676e5e0c21cd081f5f510718418c4e294f2ec520e7eb2020db7996e29
                    • Instruction Fuzzy Hash: CFF03A755403947EEB30472BAC0DF7B3EBDD7C6F50F12009AF908B21A0C2614888DAB0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1388 dd61fe-dd6217 1389 dd622d-dd6232 1388->1389 1390 dd6219-dd6229 call ddfe21 1388->1390 1392 dd623f-dd6263 MultiByteToWideChar 1389->1392 1393 dd6234-dd623c 1389->1393 1390->1389 1400 dd622b 1390->1400 1395 dd6269-dd6275 1392->1395 1396 dd63f6-dd6409 call dc0a8c 1392->1396 1393->1392 1397 dd62c9 1395->1397 1398 dd6277-dd6288 1395->1398 1404 dd62cb-dd62cd 1397->1404 1401 dd628a-dd6299 call de2040 1398->1401 1402 dd62a7-dd62b8 call dd3820 1398->1402 1400->1389 1407 dd63eb 1401->1407 1413 dd629f-dd62a5 1401->1413 1402->1407 1414 dd62be 1402->1414 1404->1407 1408 dd62d3-dd62e6 MultiByteToWideChar 1404->1408 1412 dd63ed-dd63f4 call dd1537 1407->1412 1408->1407 1411 dd62ec-dd62fe call dd3467 1408->1411 1419 dd6303-dd6307 1411->1419 1412->1396 1418 dd62c4-dd62c7 1413->1418 1414->1418 1418->1404 1419->1407 1420 dd630d-dd6314 1419->1420 1421 dd634e-dd635a 1420->1421 1422 dd6316-dd631b 1420->1422 1424 dd635c-dd636d 1421->1424 1425 dd63a6 1421->1425 1422->1412 1423 dd6321-dd6323 1422->1423 1423->1407 1426 dd6329-dd6343 call dd3467 1423->1426 1428 dd636f-dd637e call de2040 1424->1428 1429 dd6388-dd6399 call dd3820 1424->1429 1427 dd63a8-dd63aa 1425->1427 1426->1412 1441 dd6349 1426->1441 1431 dd63ac-dd63c5 call dd3467 1427->1431 1432 dd63e4-dd63ea call dd1537 1427->1432 1428->1432 1444 dd6380-dd6386 1428->1444 1429->1432 1440 dd639b 1429->1440 1431->1432 1446 dd63c7-dd63ce 1431->1446 1432->1407 1445 dd63a1-dd63a4 1440->1445 1441->1407 1444->1445 1445->1427 1447 dd640a-dd6410 1446->1447 1448 dd63d0-dd63d1 1446->1448 1449 dd63d2-dd63e2 WideCharToMultiByte 1447->1449 1448->1449 1449->1432 1450 dd6412-dd6419 call dd1537 1449->1450 1450->1412
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00DC82D9,00DC82D9,?,?,?,00DD644F,00000001,00000001,8BE85006), ref: 00DD6258
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00DD644F,00000001,00000001,8BE85006,?,?,?), ref: 00DD62DE
                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00DD63D8
                    • __freea.LIBCMT ref: 00DD63E5
                      • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                    • __freea.LIBCMT ref: 00DD63EE
                    • __freea.LIBCMT ref: 00DD6413
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                    • String ID:
                    • API String ID: 1414292761-0
                    • Opcode ID: 1ba76e8a487046be36db3c061054cd43e981221630ed534a1524fdad0635023b
                    • Instruction ID: 9880a1d95afdb09dde2b385da6e3ab66384dded689bc1d82a644ef6eb89052f1
                    • Opcode Fuzzy Hash: 1ba76e8a487046be36db3c061054cd43e981221630ed534a1524fdad0635023b
                    • Instruction Fuzzy Hash: 5B51E172600216AFDB258FA4DC81EBF7BA9EB44750F1D462AFC05D6241DB34DC54D6B0

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DA1BF4
                      • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00DA1BFC
                      • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DA1C07
                      • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DA1C12
                      • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00DA1C1A
                      • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00DA1C22
                      • Part of subcall function 00DA1B4A: RegisterWindowMessageW.USER32(00000004,?,00DA12C4), ref: 00DA1BA2
                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00DA136A
                    • OleInitialize.OLE32 ref: 00DA1388
                    • CloseHandle.KERNEL32(00000000), ref: 00DE24AB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                    • String ID: My$Py
                    • API String ID: 1986988660-4290306906
                    • Opcode ID: 0ccc626b0aeb54077a7fc15be1de015aec88d509a65cf0cf6c1e678d597b24bd
                    • Instruction ID: f59fda6d4cadca1abb867c047f889c16ef543b0b7d99885aef838628d2e503ed
                    • Opcode Fuzzy Hash: 0ccc626b0aeb54077a7fc15be1de015aec88d509a65cf0cf6c1e678d597b24bd
                    • Instruction Fuzzy Hash: DB71AEB49113408FD388DF7FA8466553AE5FBC934475592AED01EF7261EB308489CF62

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1610 1623b0-1624c4 call 160000 call 1622a0 CreateFileW 1617 1624c6 1610->1617 1618 1624cb-1624db 1610->1618 1619 16257b-162580 1617->1619 1621 1624e2-1624fc VirtualAlloc 1618->1621 1622 1624dd 1618->1622 1623 162500-162517 ReadFile 1621->1623 1624 1624fe 1621->1624 1622->1619 1625 16251b-162555 call 1622e0 call 1612a0 1623->1625 1626 162519 1623->1626 1624->1619 1631 162557-16256c call 162330 1625->1631 1632 162571-162579 ExitProcess 1625->1632 1626->1619 1631->1632 1632->1619
                    APIs
                      • Part of subcall function 001622A0: Sleep.KERNELBASE(000001F4), ref: 001622B1
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 001624BA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.354887863.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_160000_New order.jbxd
                    Similarity
                    • API ID: CreateFileSleep
                    • String ID: 5FPSWP5ULI1BUHZII
                    • API String ID: 2694422964-1092507784
                    • Opcode ID: ee390140f895fd5dac58fa8e0404f9ca52b1755bfb22cd9cfb98ea61d77dee74
                    • Instruction ID: 40db547d52932f86cc23fb8902b0db87c60caa4a6a0dd17154895d9d2029819a
                    • Opcode Fuzzy Hash: ee390140f895fd5dac58fa8e0404f9ca52b1755bfb22cd9cfb98ea61d77dee74
                    • Instruction Fuzzy Hash: 81515031D04649EAEF15DBA4CC65BEFBB78AF14300F104599E609BB2C0DB791B48CBA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1634 e12947-e129b9 call de1f50 call e125d6 call dbfe0b call da5722 call e1274e call da511f call dc5232 1649 e12a6c-e12a73 call e12e66 1634->1649 1650 e129bf-e129c6 call e12e66 1634->1650 1655 e12a75-e12a77 1649->1655 1656 e12a7c 1649->1656 1650->1655 1657 e129cc-e12a6a call dcd583 call dc4983 call dc9038 call dcd583 call dc9038 * 2 1650->1657 1658 e12cb6-e12cb7 1655->1658 1660 e12a7f-e12b3a call da50f5 * 8 call e13017 call dce5eb 1656->1660 1657->1660 1661 e12cd5-e12cdb 1658->1661 1699 e12b43-e12b5e call e12792 1660->1699 1700 e12b3c-e12b3e 1660->1700 1664 e12cf0-e12cf6 1661->1664 1665 e12cdd-e12ce8 call dbfdcd call dbfe14 1661->1665 1679 e12ced 1665->1679 1679->1664 1703 e12bf0-e12bfc call dce678 1699->1703 1704 e12b64-e12b6c 1699->1704 1700->1658 1711 e12c12-e12c16 1703->1711 1712 e12bfe-e12c0d DeleteFileW 1703->1712 1705 e12b74 1704->1705 1706 e12b6e-e12b72 1704->1706 1708 e12b79-e12b97 call da50f5 1705->1708 1706->1708 1718 e12bc1-e12bd7 call e1211d call dcdbb3 1708->1718 1719 e12b99-e12b9e 1708->1719 1714 e12c91-e12ca5 CopyFileW 1711->1714 1715 e12c18-e12c7e call e125d6 call dcd2eb * 2 call e122ce 1711->1715 1712->1658 1716 e12ca7-e12cb4 DeleteFileW 1714->1716 1717 e12cb9-e12ccf DeleteFileW call e12fd8 1714->1717 1715->1717 1739 e12c80-e12c8f DeleteFileW 1715->1739 1716->1658 1726 e12cd4 1717->1726 1732 e12bdc-e12be7 1718->1732 1723 e12ba1-e12bb4 call e128d2 1719->1723 1733 e12bb6-e12bbf 1723->1733 1726->1661 1732->1704 1736 e12bed 1732->1736 1733->1718 1736->1703 1739->1658
                    APIs
                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E12C05
                    • DeleteFileW.KERNEL32(?), ref: 00E12C87
                    • CopyFileW.KERNEL32 ref: 00E12C9D
                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E12CAE
                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E12CC0
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: File$Delete$Copy
                    • String ID:
                    • API String ID: 3226157194-0
                    • Opcode ID: eec8294ffd1360ccf44e8495775954be29a8cc3ada51cbd9dcbb9ef32d52a59c
                    • Instruction ID: ac3dd63d5f7259a97abeddd9f55b2da833fa2d46b4939b02c5f35400854ef517
                    • Opcode Fuzzy Hash: eec8294ffd1360ccf44e8495775954be29a8cc3ada51cbd9dcbb9ef32d52a59c
                    • Instruction Fuzzy Hash: 15B16D71900119ABDF21DBA4CC85EDEBBBDEF09350F1040AAF609F7151EA309A948FB1
                    APIs
                    • RegOpenKeyExW.KERNEL32 ref: 00DA3B40
                    • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00DA3B61
                    • RegCloseKey.ADVAPI32(00000000), ref: 00DA3B83
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID: Control Panel\Mouse
                    • API String ID: 3677997916-824357125
                    • Opcode ID: 2dc29d3c8758376bd5bfbf53e2ca436278dc20c663c0507e1b0914a252995f79
                    • Instruction ID: 4a719a52d7525dfe41607599b5e58eb2639199d85ae07fdae19a735197968795
                    • Opcode Fuzzy Hash: 2dc29d3c8758376bd5bfbf53e2ca436278dc20c663c0507e1b0914a252995f79
                    • Instruction Fuzzy Hash: 4A112AB5511208FFDB208FA5DC89AAEBBBAEF05744B144459B805E7110D331DE449B70
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00DA13C6,00000000,00000000,?,00DD301A,00DA13C6,00000000,00000000,00000000,?,00DD328B,00000006,FlsSetValue), ref: 00DD30A5
                    • GetLastError.KERNEL32(?,00DD301A,00DA13C6,00000000,00000000,00000000,?,00DD328B,00000006,FlsSetValue,00E42290,FlsSetValue,00000000,00000364,?,00DD2E46), ref: 00DD30B1
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00DD301A,00DA13C6,00000000,00000000,00000000,?,00DD328B,00000006,FlsSetValue,00E42290,FlsSetValue,00000000), ref: 00DD30BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID:
                    • API String ID: 3177248105-0
                    • Opcode ID: 793afb764485d0b8e301b52f606295ab3143506bd418eb4e441c9d227d5602eb
                    • Instruction ID: f066753e8fadfbb10447ae0b981c5788df873859dafb67621d783cc4294d56b1
                    • Opcode Fuzzy Hash: 793afb764485d0b8e301b52f606295ab3143506bd418eb4e441c9d227d5602eb
                    • Instruction Fuzzy Hash: 49012B32301626AFCB314FBAAC48A777B98AF05BA1B280621F905F3390C721D945C7F1
                    APIs
                    • GetOpenFileNameW.COMDLG32(?), ref: 00DE2C8C
                      • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                      • Part of subcall function 00DA2DA5: GetLongPathNameW.KERNELBASE ref: 00DA2DC4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Name$Path$FileFullLongOpen
                    • String ID: X$`e
                    • API String ID: 779396738-4036142377
                    • Opcode ID: 9abc5bc2b02a04ecffd15f060087f684eb904ea0ebe61bbd975107eeaeb27763
                    • Instruction ID: c92d88d6264d9181c6f7f4bd3dc11562430fea2275c37658a772aa4f91b81e14
                    • Opcode Fuzzy Hash: 9abc5bc2b02a04ecffd15f060087f684eb904ea0ebe61bbd975107eeaeb27763
                    • Instruction Fuzzy Hash: B821C371A10298AFCB01EF99D805BEE7BFCEF49304F004059E405B7241DBB89A898FB1
                    APIs
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0668
                      • Part of subcall function 00DC32A4: RaiseException.KERNEL32(?,?,?,00DC068A,?,00E71444,?,?,?,?,?,?,00DC068A,00DA1129,00E68738,00DA1129), ref: 00DC3304
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0685
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Exception@8Throw$ExceptionRaise
                    • String ID: Unknown exception
                    • API String ID: 3476068407-410509341
                    • Opcode ID: 9e52636acc6927a3fb2a8b421086c40fb0f3fa4d9a755c29069792781818b63d
                    • Instruction ID: 9355e8d46c4b3e53020c0ee8ea331e815b8333f2b329eebe262dcb7a5dd6fdfe
                    • Opcode Fuzzy Hash: 9e52636acc6927a3fb2a8b421086c40fb0f3fa4d9a755c29069792781818b63d
                    • Instruction Fuzzy Hash: D4F0683494030EF78F00BA64EC4AE9D7F6C9E40350BA44539B915D7591EF71DA66C5B0
                    APIs
                    • GetTempPathW.KERNEL32(00000104,?), ref: 00E1302F
                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00E13044
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Temp$FileNamePath
                    • String ID: aut
                    • API String ID: 3285503233-3010740371
                    • Opcode ID: ec3917a66204800e552ef4f75e3c07d85544d0aa02d964b581870500b24b171d
                    • Instruction ID: 7b875d61adbf5628db2b0b0874f6855cc108017be3fefb01b4a772d3057b5a28
                    • Opcode Fuzzy Hash: ec3917a66204800e552ef4f75e3c07d85544d0aa02d964b581870500b24b171d
                    • Instruction Fuzzy Hash: DFD05B72540318ABDA209795AC0DFC73E6CD704750F0002517655F20A1DAB0D544CBD0
                    APIs
                    • CreateProcessW.KERNEL32(?,00000000), ref: 00161ACD
                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00161B13
                    Memory Dump Source
                    • Source File: 00000000.00000002.354887863.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_160000_New order.jbxd
                    Similarity
                    • API ID: Process$CreateMemoryRead
                    • String ID:
                    • API String ID: 2726527582-0
                    • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                    • Instruction ID: 422fa3c0a4c875cd99f92e4ed8732ea339cb8ed2e37d69bd71b9b1334b13263f
                    • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                    • Instruction Fuzzy Hash: FA620930A14658DBEB24CFA4CC51BDEB372EF58300F1491A9D10DEB2A0E7769E91CB59
                    APIs
                    • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00E282F5
                    • TerminateProcess.KERNEL32(00000000), ref: 00E282FC
                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 00E284DD
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$CurrentFreeLibraryTerminate
                    • String ID:
                    • API String ID: 146820519-0
                    • Opcode ID: 18c3db7ba0639ee1005e45b714ab98e8d402adc25b4daf5eaaa40d54ef5753f2
                    • Instruction ID: 8d847f49d2a04921492e55f89409a8b5af09db7373f380e1cb9875420b7bded8
                    • Opcode Fuzzy Hash: 18c3db7ba0639ee1005e45b714ab98e8d402adc25b4daf5eaaa40d54ef5753f2
                    • Instruction Fuzzy Hash: BB128A71A08311CFD714DF28C584B6ABBE1FF89318F04995DE8999B292CB30ED45CB92
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 63a306c5e701c40c4d8f7d31f13edb3fead19524063b771d4779d3e73b5c5518
                    • Instruction ID: da6e67cad21067e5cd789aabd1f494192dfdd040ca19708d94ef9eadbfcd02c7
                    • Opcode Fuzzy Hash: 63a306c5e701c40c4d8f7d31f13edb3fead19524063b771d4779d3e73b5c5518
                    • Instruction Fuzzy Hash: 3551BD71A1060AAFDB20AFA9E845FEEBFB9EF05310F18005BF405A7395D6719A01DB71
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001), ref: 00DA556D
                    • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 00DA557D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: e3f93958ee6a496e0f91487370a6c7e2989cd0e0f3a04c019a94e48ba674d586
                    • Instruction ID: 8739b23ec7b0176f755274ee400f99d37c96e70c610984de9f5d41faa758219a
                    • Opcode Fuzzy Hash: e3f93958ee6a496e0f91487370a6c7e2989cd0e0f3a04c019a94e48ba674d586
                    • Instruction Fuzzy Hash: DF316E71A00A09FFDB14CF68D880B99B7B6FF49314F188629E91997244D771FE94CBA0
                    APIs
                    • CloseHandle.KERNELBASE(00000000), ref: 00DD8704
                    • GetLastError.KERNEL32(?,00DD85CC,?,00E68CC8,0000000C), ref: 00DD870E
                    • __dosmaperr.LIBCMT ref: 00DD8739
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseErrorHandleLast__dosmaperr
                    • String ID:
                    • API String ID: 2583163307-0
                    • Opcode ID: 96d726b2667def3e990c527d3b3c77b87c661fff102caef1b11c0dd57ee168ce
                    • Instruction ID: 9963398a8bce6b2e2460ed2134b7352c9bb5b0832c1517854dc2c022a00a782a
                    • Opcode Fuzzy Hash: 96d726b2667def3e990c527d3b3c77b87c661fff102caef1b11c0dd57ee168ce
                    • Instruction Fuzzy Hash: 94014E336056603AD6267734BC45B7E6B49CB81774F3D015BF8189B3D2DEA0CC85A270
                    APIs
                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00E12FF2
                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00E12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E13006
                    • CloseHandle.KERNEL32(00000000), ref: 00E1300D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleTime
                    • String ID:
                    • API String ID: 3397143404-0
                    • Opcode ID: 5b38b01f5147ba7d91f3eb3035d6439f6c3b578eea7a8ba78590a7118cbe95ce
                    • Instruction ID: 0ea1725bc1297ccebd8f36ed55d72fa15c2edd646ce83cdb5d331f76a55f4245
                    • Opcode Fuzzy Hash: 5b38b01f5147ba7d91f3eb3035d6439f6c3b578eea7a8ba78590a7118cbe95ce
                    • Instruction Fuzzy Hash: 58E0CD322813147BD2301766BC0DFCB3E6CDBCAF75F214210F759750D146A0950553A8
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 00DB17F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Init_thread_footer
                    • String ID: CALL
                    • API String ID: 1385522511-4196123274
                    • Opcode ID: a9f4028d3077605333d6fdd763e13eef3566364905dda68cad1f9a4f880d8a31
                    • Instruction ID: 83333637e2890fc0eb63e643cb8b41908c0b9bcee7aa4848fa98548f484b9f3c
                    • Opcode Fuzzy Hash: a9f4028d3077605333d6fdd763e13eef3566364905dda68cad1f9a4f880d8a31
                    • Instruction Fuzzy Hash: 37228974608241DFC714DF24C8A0AAABBF1FF85314F68891DF5969B361D731E845CBA2
                    APIs
                    • _wcslen.LIBCMT ref: 00E16F6B
                      • Part of subcall function 00DA4ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EFD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LibraryLoad_wcslen
                    • String ID: >>>AUTOIT SCRIPT<<<
                    • API String ID: 3312870042-2806939583
                    • Opcode ID: 8b50a2515601e756a07ce662e51dd2a3a3fc3a1d4b760595a2cd6c2fed76f1b8
                    • Instruction ID: cb5d1e85f326316ec952f92b2a30e6ad5d7b594f196d69a023c2690b3c31a5e3
                    • Opcode Fuzzy Hash: 8b50a2515601e756a07ce662e51dd2a3a3fc3a1d4b760595a2cd6c2fed76f1b8
                    • Instruction Fuzzy Hash: 11B185315083019FCB14EF24C8919AEB7E5EF95714F04895DF496972A1EB30ED89CBB2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Info
                    • String ID:
                    • API String ID: 1807457897-3916222277
                    • Opcode ID: 4664902f026a81c75639ad9ca23316a29e8e90b8abc1f09233fb1da324322374
                    • Instruction ID: 3f3acb652053e849d1183060fc4dfb8d6f100a8a1ceb7e5c7690661f61ed16d8
                    • Opcode Fuzzy Hash: 4664902f026a81c75639ad9ca23316a29e8e90b8abc1f09233fb1da324322374
                    • Instruction Fuzzy Hash: F4411A705043499ADF218E688C94BFABBE9EB45304F2814EEE5CA87242D6359A45DF70
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: __fread_nolock
                    • String ID: EA06
                    • API String ID: 2638373210-3962188686
                    • Opcode ID: 6a5177db5df4d9afd263d6682bfe4ea328f9a430ad0ff2d25ad70d8773e53cce
                    • Instruction ID: dd21188690a1928ba53b5feed641bff59287e2aa50170b6200f3a676439f8d5c
                    • Opcode Fuzzy Hash: 6a5177db5df4d9afd263d6682bfe4ea328f9a430ad0ff2d25ad70d8773e53cce
                    • Instruction Fuzzy Hash: 5E01B5B29442587EDF28C7A8CC56FEEBBF8DB05315F00455EF252E2181E5B4E6188B70
                    APIs
                    • LCMapStringW.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,00000001,?,?,?,?,?), ref: 00DD34D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: String
                    • String ID: LCMapStringEx
                    • API String ID: 2568140703-3893581201
                    • Opcode ID: 822cdf813dec3fbe2945a1d66f47881794d50917256654dc5b36ee9889e2219d
                    • Instruction ID: 802064970f415adfe6a5dd48c281cba7dedf29d9e3538071d7530d78d3a0e271
                    • Opcode Fuzzy Hash: 822cdf813dec3fbe2945a1d66f47881794d50917256654dc5b36ee9889e2219d
                    • Instruction Fuzzy Hash: 8601293260020DBBCF125F92DD05EEE3F62EF08750F044159FE0466160C636D931EBA1
                    APIs
                    • InitializeCriticalSectionAndSpinCount.KERNELBASE(00000FA0,-00000020,00DD81A8,-00000020,00000FA0,00000000,00E3CBF0,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD3450
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CountCriticalInitializeSectionSpin
                    • String ID: InitializeCriticalSectionEx
                    • API String ID: 2593887523-3084827643
                    • Opcode ID: 1fd144d1250f52a19df3142a56f1d256fc265f87d15268abe6c604754a52bd92
                    • Instruction ID: 93fac23ce591e24bb2cdba7c9dd44de42af382a6281c448c05175aa82a333996
                    • Opcode Fuzzy Hash: 1fd144d1250f52a19df3142a56f1d256fc265f87d15268abe6c604754a52bd92
                    • Instruction Fuzzy Hash: 2EF0B43160120CFBCB116F51EC05DBE7F61EF14B50B408159FE097A261CA759A10ABA2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Alloc
                    • String ID: FlsAlloc
                    • API String ID: 2773662609-671089009
                    • Opcode ID: 092627340ee2d3c3a814321a40827f5480dcbd7eafd9416f1bfaf6ee56a2fd49
                    • Instruction ID: 191a05d80d237e2d3ede80fe2756c53da63f9a1f61d21e9352d656adff317c75
                    • Opcode Fuzzy Hash: 092627340ee2d3c3a814321a40827f5480dcbd7eafd9416f1bfaf6ee56a2fd49
                    • Instruction Fuzzy Hash: BEE0E53174031CBBD7106BA1AC0AE7EBB94DF94711B50025AFA0577350D9B05F0596EA
                    APIs
                    • try_get_function.LIBVCRUNTIME ref: 00DC3615
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: try_get_function
                    • String ID: FlsAlloc
                    • API String ID: 2742660187-671089009
                    • Opcode ID: 63e0a1169402c11edf501483cbf0b4eb968518a1fa8e1db2f0f67467e013e934
                    • Instruction ID: bf0e3e0fa27e358d71b5a6724c1c957ba21cea7c4723058dd1ccacd1d0d247dd
                    • Opcode Fuzzy Hash: 63e0a1169402c11edf501483cbf0b4eb968518a1fa8e1db2f0f67467e013e934
                    • Instruction Fuzzy Hash: 73D05B32B8573877C6143B95AD0EFA9BF54DB01BB2F084071FD0C76251D5518E1187D1
                    APIs
                      • Part of subcall function 00DDC74F: GetOEMCP.KERNEL32(00000000), ref: 00DDC77A
                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00DDCA1D,?,00000000), ref: 00DDCBF0
                    • GetCPInfo.KERNEL32(00000000,00DDCA1D,?,?,?,00DDCA1D,?,00000000), ref: 00DDCC03
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CodeInfoPageValid
                    • String ID:
                    • API String ID: 546120528-0
                    • Opcode ID: 4585fe49d8e28b1e3a73abcf521a0f9ac6a0f0a2ef01fc7da1e3acd700eb27f1
                    • Instruction ID: b96de0b8856dfe54a5607f3d35d4f09bf5e85bb927325277fdabcdd830f495d1
                    • Opcode Fuzzy Hash: 4585fe49d8e28b1e3a73abcf521a0f9ac6a0f0a2ef01fc7da1e3acd700eb27f1
                    • Instruction Fuzzy Hash: 885156709202479EDB208F79C8846BBBBE5EF41300F18A16FD19A8B351D734D945CBB0
                    APIs
                      • Part of subcall function 00DD2D74: GetLastError.KERNEL32(?,?,00DD5686,00DE3CD6,?,00000000,?,00DD5B6A,?,?,?,?,?,00DCE6D1,?,00E68A48), ref: 00DD2D78
                      • Part of subcall function 00DD2D74: _free.LIBCMT ref: 00DD2DAB
                      • Part of subcall function 00DD2D74: SetLastError.KERNEL32(00000000,?,?,?,?,00DCE6D1,?,00E68A48,00000010,00DA4F4A,?,?,00000000,00DE3CD6), ref: 00DD2DEC
                      • Part of subcall function 00DD2D74: _abort.LIBCMT ref: 00DD2DF2
                      • Part of subcall function 00DDCADA: _abort.LIBCMT ref: 00DDCB0C
                      • Part of subcall function 00DDCADA: _free.LIBCMT ref: 00DDCB40
                      • Part of subcall function 00DDC74F: GetOEMCP.KERNEL32(00000000), ref: 00DDC77A
                    • _free.LIBCMT ref: 00DDCA33
                    • _free.LIBCMT ref: 00DDCA69
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$ErrorLast_abort
                    • String ID:
                    • API String ID: 2991157371-0
                    • Opcode ID: c6c4c4c4213b5027cb15b548fff3e205029b83aeb0194ac91b9c21a619a030a6
                    • Instruction ID: b3b03733f2266adcbda465f99e29d28f38757919d82fafaf1e1a42c699ae881f
                    • Opcode Fuzzy Hash: c6c4c4c4213b5027cb15b548fff3e205029b83aeb0194ac91b9c21a619a030a6
                    • Instruction Fuzzy Hash: D031C431904249AFDB11EBA9D841BA9B7F5EF50320F25219BE8049B3A2EB719D41DB70
                    APIs
                    • GetProcAddress.KERNEL32(00000000,00DA1129,00000000,00000000,00000000,?,00DD328B,00000006,FlsSetValue,00E42290,FlsSetValue,00000000,00000364,?,00DD2E46,00000000), ref: 00DD3037
                    • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DD3044
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AddressProc__crt_fast_encode_pointer
                    • String ID:
                    • API String ID: 2279764990-0
                    • Opcode ID: 153af3e19ba62810beb56b377ab42465ec88de7051f0287dbdd42958fb69d773
                    • Instruction ID: 3279da6f35c6ca5c55efba584b443ac8457c83699e367c53302414a4287f3594
                    • Opcode Fuzzy Hash: 153af3e19ba62810beb56b377ab42465ec88de7051f0287dbdd42958fb69d773
                    • Instruction Fuzzy Hash: F911E737A005209FDB319E59EC4097B7395AB847A472A0121FD55BB358D731DE0197F2
                    APIs
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00DA5773
                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000), ref: 00DE4052
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: cafa2e841ae1e99c0f677999d07840fe3715c2fe32aa64cf99e7bce226df2a34
                    • Instruction ID: 89389f9ab50124e25d30eae7a6bc79cf6cd9e739a6969aea4b8a09d52eacb494
                    • Opcode Fuzzy Hash: cafa2e841ae1e99c0f677999d07840fe3715c2fe32aa64cf99e7bce226df2a34
                    • Instruction Fuzzy Hash: 10015231145225BAE3315A2ADC0EF977F98EF067B4F148310BA9C6A1E0C7B45854DBA0
                    APIs
                      • Part of subcall function 00DC3600: try_get_function.LIBVCRUNTIME ref: 00DC3615
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DC3432
                    • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00DC343D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                    • String ID:
                    • API String ID: 806969131-0
                    • Opcode ID: ea42b7e8a27bae4b22ac04f71a28b8613925bb87c73798227d51f19ff9cb70a8
                    • Instruction ID: 5903c5a25732d0f2ccf25d6f136d218d675b514c3f7a011e34c87632451369c3
                    • Opcode Fuzzy Hash: ea42b7e8a27bae4b22ac04f71a28b8613925bb87c73798227d51f19ff9cb70a8
                    • Instruction Fuzzy Hash: 9CD0A73054C303A80C0E26F43803F5913408501BB4360D25EE420D72C1DB6183052436
                    APIs
                      • Part of subcall function 00DA4E90: LoadLibraryA.KERNEL32(kernel32.dll), ref: 00DA4E9C
                      • Part of subcall function 00DA4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EAE
                      • Part of subcall function 00DA4E90: FreeLibrary.KERNEL32(00000000,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EC0
                    • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EFD
                      • Part of subcall function 00DA4E59: LoadLibraryA.KERNEL32(kernel32.dll), ref: 00DA4E62
                      • Part of subcall function 00DA4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E74
                      • Part of subcall function 00DA4E59: FreeLibrary.KERNEL32(00000000,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E87
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Library$Load$AddressFreeProc
                    • String ID:
                    • API String ID: 2632591731-0
                    • Opcode ID: 5a3ba8de460423a6bc35b8665369fa68fd2badf6617269cd59b46671f07f2a5e
                    • Instruction ID: 5ca831e17edc014026329894164e52db6954c486ce45ad3d5554110371e42953
                    • Opcode Fuzzy Hash: 5a3ba8de460423a6bc35b8665369fa68fd2badf6617269cd59b46671f07f2a5e
                    • Instruction Fuzzy Hash: 1E110132610205AECB14BB60DC16FAD77A4EF81B10F20842DF552B71C1EEB4EA449770
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: __wsopen_s
                    • String ID:
                    • API String ID: 3347428461-0
                    • Opcode ID: a64d1eaa3e5ee57f835d7319103dbb0ba0c99476b89643780e5a121b3043cef4
                    • Instruction ID: 40e21f75cc5747a6c3d8728b9ff58761d5511c70d897826ce07779736e9a84c1
                    • Opcode Fuzzy Hash: a64d1eaa3e5ee57f835d7319103dbb0ba0c99476b89643780e5a121b3043cef4
                    • Instruction Fuzzy Hash: 6111187590420AAFCB06DF58E941A9A7BF5EF48314F14405AF808AB312DB31EA15DBB5
                    APIs
                    • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000), ref: 00DA9A9C
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID:
                    • API String ID: 2738559852-0
                    • Opcode ID: 98fcd570a4de76b87a4514bfd7b7f902a74ee0cad8f60dae380f77f2d0e11572
                    • Instruction ID: 26dafc4081cce687726544c0e49ac010ddf8c3573ba1020f8edb919f689b98d0
                    • Opcode Fuzzy Hash: 98fcd570a4de76b87a4514bfd7b7f902a74ee0cad8f60dae380f77f2d0e11572
                    • Instruction Fuzzy Hash: 67113632204B059FD7208F1AC890B66B7F9EB45764F14C42EE99B8AA51C770E945CB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: __alldvrm
                    • String ID:
                    • API String ID: 65215352-0
                    • Opcode ID: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                    • Instruction ID: 8231bd02c15754835d45d552d7fa90bb6f3d63479743634b52571495947fddcf
                    • Opcode Fuzzy Hash: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                    • Instruction Fuzzy Hash: D10171B1914309AFEB38EFA4CD46BAEB7A8EB40324F55856EE406D7200D675DA008775
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                    • Instruction ID: 950c51ba5c32353b0be0cff0583e76b6b009d340efbe6363a14d2d4c8deababa
                    • Opcode Fuzzy Hash: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                    • Instruction Fuzzy Hash: 32F0F472561A11A7C6323AB98C05F6A339DDF62330F140B2EF421932D2DB74E8029AB5
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: ebbb7b7bea1268fa1111748a4ad2ad4202814fb76fe99f68fdb9fc820d81bcc4
                    • Instruction ID: a01b525cd4106fff27f454a36f4795911971aa097f0b83c67e46748abdd68e9f
                    • Opcode Fuzzy Hash: ebbb7b7bea1268fa1111748a4ad2ad4202814fb76fe99f68fdb9fc820d81bcc4
                    • Instruction Fuzzy Hash: B2E0E5311023256AD62126679C04F9A3A4EEF427B0F1D002ABC44A7780CB61DD01A2F2
                    APIs
                    • _free.LIBCMT ref: 00DD4D9C
                      • Part of subcall function 00DD29C8: HeapFree.KERNEL32(00000000,00000000), ref: 00DD29DE
                      • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorFreeHeapLast_free
                    • String ID:
                    • API String ID: 1353095263-0
                    • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                    • Instruction ID: 0401d6527be0a2560c34c14746d549bc5ff8dc67152279e74bc50205f67a83fe
                    • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                    • Instruction Fuzzy Hash: 12E092361403059F8720CF6CD800A82B7F5EF94330724852AE89DE3310D731F812CBA0
                    APIs
                    • FreeLibrary.KERNEL32(?,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4F6D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID:
                    • API String ID: 3664257935-0
                    • Opcode ID: 307837e018a05f5ca7b1e4bc0cfe351162def4f0a361236ce89d8e77afbe8fac
                    • Instruction ID: 9ad631e16097f141bdec2fa52d871c0f0712695bbcc36d4fedb9325eba975371
                    • Opcode Fuzzy Hash: 307837e018a05f5ca7b1e4bc0cfe351162def4f0a361236ce89d8e77afbe8fac
                    • Instruction Fuzzy Hash: AAF0A97100A352CFCB348F20D490822BBF0EF42329324997EE1EA83620C7B1D848EF21
                    APIs
                    • GetLongPathNameW.KERNELBASE ref: 00DA2DC4
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LongNamePath_wcslen
                    • String ID:
                    • API String ID: 541455249-0
                    • Opcode ID: a0a94781772d70e00ed52ae8fa87b00ed0340dbf2ce0543676a6619ca0e0e673
                    • Instruction ID: cc5cc2989008425d051dcf7e9915d6f97ae71f92b0c06edd3b73902febbd3495
                    • Opcode Fuzzy Hash: a0a94781772d70e00ed52ae8fa87b00ed0340dbf2ce0543676a6619ca0e0e673
                    • Instruction Fuzzy Hash: B9E0CD766041245BC711A2599C05FDA77DDDFC8790F0400B1FD09E7258D970ED8486B0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: __fread_nolock
                    • String ID:
                    • API String ID: 2638373210-0
                    • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                    • Instruction ID: 6dc89b91a881ac121c2a2eabcf058623a6f8a536113155d53d9d2783d85088e2
                    • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                    • Instruction Fuzzy Hash: 9BE04FB0609B005FDF395A28AC51BF677E8DF49304F00086EF69B93252E57268958A5D
                    APIs
                      • Part of subcall function 00DA3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DA3908
                      • Part of subcall function 00DAD730: GetInputState.USER32 ref: 00DAD807
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00DA2B6B
                      • Part of subcall function 00DA30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00DA314E
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                    • String ID:
                    • API String ID: 3667716007-0
                    • Opcode ID: daf9e49119ce2cbf30fa5dbefb4975955abf25adfe1cef76e6df154001b9c16f
                    • Instruction ID: 034d9628949f84786b81b8f232e924233e59fd48231081ae70f0eb93288e6dd5
                    • Opcode Fuzzy Hash: daf9e49119ce2cbf30fa5dbefb4975955abf25adfe1cef76e6df154001b9c16f
                    • Instruction Fuzzy Hash: CCE086223042440BCA08BB79A85657DB75ADBD7351F40557EF157631A2DE2889494371
                    APIs
                    • CreateFileW.KERNELBASE(00000000,00000000,?,00DE0704,?,?,00000000), ref: 00DE03B7
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: dfaed938351837801a572ca9168a74b5b5485063e0f753c9753c02e7309c4a34
                    • Instruction ID: 04d0ab402e6c53dcb3e81a9e009ba1dda7db6b7fcfd3ab6430dec21e648aa906
                    • Opcode Fuzzy Hash: dfaed938351837801a572ca9168a74b5b5485063e0f753c9753c02e7309c4a34
                    • Instruction Fuzzy Hash: 3ED06C3204010DBFDF028F85DD0AEDA3FAAFB48714F114000BE5866020C732E821AB90
                    APIs
                    • SystemParametersInfoW.USER32 ref: 00DA1CBC
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: InfoParametersSystem
                    • String ID:
                    • API String ID: 3098949447-0
                    • Opcode ID: b25604f0024ebf76e620c229cd04a4928b17758f17197ad3636a3dd412b61ad5
                    • Instruction ID: c46c2efb985f7ffc88e1c87b23e91c02ca8a09f570e80322764021c1e390731a
                    • Opcode Fuzzy Hash: b25604f0024ebf76e620c229cd04a4928b17758f17197ad3636a3dd412b61ad5
                    • Instruction Fuzzy Hash: 7CC04836280308AFE2148B96AC4AF107B64A748B00F148001F64DB95E382A268A8AA61
                    APIs
                      • Part of subcall function 00DA5745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00DA5773
                    • GetLastError.KERNEL32(00000002,00000000), ref: 00E176DE
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateErrorFileLast
                    • String ID:
                    • API String ID: 1214770103-0
                    • Opcode ID: 5359939d31261e128bba6e112792a27131962d6a254f19cb0952205ec9484dc1
                    • Instruction ID: 7c171799092195414ec6157a25d38cb5e8bdcdc43a1e50d47bdde35b3f7edc18
                    • Opcode Fuzzy Hash: 5359939d31261e128bba6e112792a27131962d6a254f19cb0952205ec9484dc1
                    • Instruction Fuzzy Hash: 0F8170306087019FCB14EF28C491BA9B7F1EF8A754F04555DF8966B292DB30ED85CBA2
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction ID: 7c232d9b83e9dd71ed2a0831647df8b35384769fa3e40314b1d3bad50c61d398
                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction Fuzzy Hash: A031E475A00109DBC718CF59D8C0AA9FBA5FF49300B2886A5E84ACF656D731EDD1CBE0
                    APIs
                    • Sleep.KERNELBASE(000001F4), ref: 001622B1
                    Memory Dump Source
                    • Source File: 00000000.00000002.354887863.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_160000_New order.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                    • Instruction ID: fedbf54ffcd9c07317634f464c29d2d40686db111b0f148efc21a79a9c121e53
                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                    • Instruction Fuzzy Hash: E5E0BF7494010EEFDB00EFE4D9496EE7BB4EF04711F1005A5FD05D7680DB309E648A62
                    APIs
                    • Sleep.KERNELBASE(000001F4), ref: 001622B1
                    Memory Dump Source
                    • Source File: 00000000.00000002.354887863.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_160000_New order.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction ID: 596bc6675a865ee8e41eb02224ec490dd7f577e0420fb831c351dcfc35c0f09f
                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction Fuzzy Hash: 78E0BF7494010E9FDB00EFA4D9496AE7BB4EF04701F100165FD0192280D73099608A62
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E3961A
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E3965B
                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E3969F
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E396C9
                    • SendMessageW.USER32 ref: 00E396F2
                    • GetKeyState.USER32(00000011), ref: 00E3978B
                    • GetKeyState.USER32(00000009), ref: 00E39798
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E397AE
                    • GetKeyState.USER32(00000010), ref: 00E397B8
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E397E9
                    • SendMessageW.USER32 ref: 00E39810
                    • SendMessageW.USER32(?,00001030,?,00E37E95), ref: 00E39918
                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E3992E
                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E39941
                    • SetCapture.USER32(?), ref: 00E3994A
                    • ClientToScreen.USER32(?,?), ref: 00E399AF
                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E399BC
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00E399D6
                    • ReleaseCapture.USER32 ref: 00E399E1
                    • GetCursorPos.USER32(?), ref: 00E39A19
                    • ScreenToClient.USER32(?,?), ref: 00E39A26
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E39A80
                    • SendMessageW.USER32 ref: 00E39AAE
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E39AEB
                    • SendMessageW.USER32 ref: 00E39B1A
                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E39B3B
                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E39B4A
                    • GetCursorPos.USER32(?), ref: 00E39B68
                    • ScreenToClient.USER32(?,?), ref: 00E39B75
                    • GetParent.USER32(?), ref: 00E39B93
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E39BFA
                    • SendMessageW.USER32 ref: 00E39C2B
                    • ClientToScreen.USER32(?,?), ref: 00E39C84
                    • TrackPopupMenuEx.USER32 ref: 00E39CB4
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E39CDE
                    • SendMessageW.USER32 ref: 00E39D01
                    • ClientToScreen.USER32(?,?), ref: 00E39D4E
                    • TrackPopupMenuEx.USER32 ref: 00E39D82
                      • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                    • GetWindowLongW.USER32(?,000000F0), ref: 00E39E05
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                    • String ID: @GUI_DRAGID$F$Hiy$p#
                    • API String ID: 3429851547-1162513791
                    • Opcode ID: aa91af50b681a048114e9d948805402ab443df8832241a8fcca422d94d8d5686
                    • Instruction ID: 6364ef79372778619df3744530734f8bb465e6eb59365b8265b60b60b814c09b
                    • Opcode Fuzzy Hash: aa91af50b681a048114e9d948805402ab443df8832241a8fcca422d94d8d5686
                    • Instruction Fuzzy Hash: A542AD31205300AFD724CF28CC49AAABFE5FF89714F101659F699A72A2D7B1E854CF52
                    APIs
                    • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00E348F3
                    • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00E34908
                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00E34927
                    • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00E3494B
                    • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00E3495C
                    • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00E3497B
                    • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00E349AE
                    • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00E349D4
                    • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00E34A0F
                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E34A56
                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E34A7E
                    • IsMenu.USER32(?), ref: 00E34A97
                    • GetMenuItemInfoW.USER32 ref: 00E34AF2
                    • GetMenuItemInfoW.USER32 ref: 00E34B20
                    • GetWindowLongW.USER32(?,000000F0), ref: 00E34B94
                    • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00E34BE3
                    • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00E34C82
                    • wsprintfW.USER32 ref: 00E34CAE
                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E34CC9
                    • GetWindowTextW.USER32 ref: 00E34CF1
                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E34D13
                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E34D33
                    • GetWindowTextW.USER32 ref: 00E34D5A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                    • String ID: %d/%02d/%02d$Hiy
                    • API String ID: 4054740463-1839175675
                    • Opcode ID: 7426f7926c67a7cf970c408f483863f50ec78c2cd051a8714aa7f64770c551ef
                    • Instruction ID: f61e9d571686e0c90b2488ef4509e99358830ae7a2c12d5d54c0bccab588f14e
                    • Opcode Fuzzy Hash: 7426f7926c67a7cf970c408f483863f50ec78c2cd051a8714aa7f64770c551ef
                    • Instruction Fuzzy Hash: 2712DEB1600218ABEB248F25CC4DFAE7FE8EF45714F145119F516FA2E1DB74AA41CB60
                    APIs
                    • GetForegroundWindow.USER32 ref: 00DBF998
                    • FindWindowW.USER32 ref: 00DFF474
                    • IsIconic.USER32(00000000), ref: 00DFF47D
                    • ShowWindow.USER32(00000000,00000009), ref: 00DFF48A
                    • SetForegroundWindow.USER32(00000000), ref: 00DFF494
                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DFF4AA
                    • GetCurrentThreadId.KERNEL32 ref: 00DFF4B1
                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DFF4BD
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DFF4CE
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DFF4D6
                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00DFF4DE
                    • SetForegroundWindow.USER32(00000000), ref: 00DFF4E1
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF4F6
                    • keybd_event.USER32 ref: 00DFF501
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF50B
                    • keybd_event.USER32 ref: 00DFF510
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF519
                    • keybd_event.USER32 ref: 00DFF51E
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF528
                    • keybd_event.USER32 ref: 00DFF52D
                    • SetForegroundWindow.USER32(00000000), ref: 00DFF530
                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00DFF557
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                    • String ID: Shell_TrayWnd
                    • API String ID: 4125248594-2988720461
                    • Opcode ID: 3ddc61f5b3c7bb35b1ae7768c2c58fb47e7a4e44802365f256f6ea0dfe9c04c2
                    • Instruction ID: 83214566699fbb83212da80be72e7b826d0eb60a8e59fc773bb2d402e299f79f
                    • Opcode Fuzzy Hash: 3ddc61f5b3c7bb35b1ae7768c2c58fb47e7a4e44802365f256f6ea0dfe9c04c2
                    • Instruction Fuzzy Hash: 9A313671A4021CBFEB205BB65C4AFBF7E6CEB44B50F254065F601F61D1C6B19900AB61
                    APIs
                      • Part of subcall function 00E016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E0170D
                      • Part of subcall function 00E016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E0173A
                      • Part of subcall function 00E016C3: GetLastError.KERNEL32 ref: 00E0174A
                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00E01286
                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00E012A8
                    • CloseHandle.KERNEL32(?), ref: 00E012B9
                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E012D1
                    • GetProcessWindowStation.USER32 ref: 00E012EA
                    • SetProcessWindowStation.USER32 ref: 00E012F4
                    • OpenDesktopW.USER32 ref: 00E01310
                      • Part of subcall function 00E010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E011FC), ref: 00E010D4
                      • Part of subcall function 00E010BF: CloseHandle.KERNEL32(?), ref: 00E010E9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                    • String ID: $default$winsta0$Z
                    • API String ID: 22674027-1808616255
                    • Opcode ID: fb9b1590ab6bcbdaded47c8a045002abc2991dfaef94c7ed742f74d921fb143a
                    • Instruction ID: e8e8bbf4092def4502f4e52036051ee03c4c8c6aa8d64416be92fd313006db42
                    • Opcode Fuzzy Hash: fb9b1590ab6bcbdaded47c8a045002abc2991dfaef94c7ed742f74d921fb143a
                    • Instruction Fuzzy Hash: C6817A71900209AFDF219FA5DC49BEE7BB9EF04708F1451A9F921BA1A0C7758998CB21
                    APIs
                      • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E01114
                      • Part of subcall function 00E010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01120
                      • Part of subcall function 00E010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E0112F
                      • Part of subcall function 00E010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01136
                      • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E0114D
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E00BCC
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E00C00
                    • GetLengthSid.ADVAPI32(?), ref: 00E00C17
                    • GetAce.ADVAPI32(?,00000000,?), ref: 00E00C51
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E00C6D
                    • GetLengthSid.ADVAPI32(?), ref: 00E00C84
                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E00C8C
                    • HeapAlloc.KERNEL32(00000000), ref: 00E00C93
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E00CB4
                    • CopySid.ADVAPI32(00000000), ref: 00E00CBB
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E00CEA
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E00D0C
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E00D1E
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00D45
                    • HeapFree.KERNEL32(00000000), ref: 00E00D4C
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00D55
                    • HeapFree.KERNEL32(00000000), ref: 00E00D5C
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00D65
                    • HeapFree.KERNEL32(00000000), ref: 00E00D6C
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00E00D78
                    • HeapFree.KERNEL32(00000000), ref: 00E00D7F
                      • Part of subcall function 00E01193: GetProcessHeap.KERNEL32(00000008,00E00BB1,?,00000000,?,00E00BB1,?), ref: 00E011A1
                      • Part of subcall function 00E01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E00BB1,?), ref: 00E011A8
                      • Part of subcall function 00E01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E00BB1,?), ref: 00E011B7
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                    • String ID:
                    • API String ID: 4175595110-0
                    • Opcode ID: 9b4e9bc80e3acc011bb300225f15ae9e1bf38164a79a6d2cab42fa759cfbb472
                    • Instruction ID: b3347691099518833f9e10bbfb5b88d191c04cfaa9b44ae2bef1b2ab23744928
                    • Opcode Fuzzy Hash: 9b4e9bc80e3acc011bb300225f15ae9e1bf38164a79a6d2cab42fa759cfbb472
                    • Instruction Fuzzy Hash: 9E71477290020AAFDF10DFA5DC48BAEBBB8BF04314F144515E914B6291D771EA89CBB0
                    APIs
                    • OpenClipboard.USER32(00E3CC08), ref: 00E1EB29
                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E1EB37
                    • GetClipboardData.USER32 ref: 00E1EB43
                    • CloseClipboard.USER32 ref: 00E1EB4F
                    • GlobalLock.KERNEL32 ref: 00E1EB87
                    • CloseClipboard.USER32 ref: 00E1EB91
                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00E1EBBC
                    • IsClipboardFormatAvailable.USER32(00000001), ref: 00E1EBC9
                    • GetClipboardData.USER32 ref: 00E1EBD1
                    • GlobalLock.KERNEL32 ref: 00E1EBE2
                    • GlobalUnlock.KERNEL32(00000000,?), ref: 00E1EC22
                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 00E1EC38
                    • GetClipboardData.USER32 ref: 00E1EC44
                    • GlobalLock.KERNEL32 ref: 00E1EC55
                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00E1EC77
                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E1EC94
                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E1ECD2
                    • GlobalUnlock.KERNEL32(00000000,?,?), ref: 00E1ECF3
                    • CountClipboardFormats.USER32 ref: 00E1ED14
                    • CloseClipboard.USER32 ref: 00E1ED59
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                    • String ID:
                    • API String ID: 420908878-0
                    • Opcode ID: 51f1667e3fad1291c9b6b0569243363a62844591b13e7b576216c5da43a1301a
                    • Instruction ID: eb76b74552e34c41eda4e24e146d7de438c1aadd06708669679615f27c073347
                    • Opcode Fuzzy Hash: 51f1667e3fad1291c9b6b0569243363a62844591b13e7b576216c5da43a1301a
                    • Instruction Fuzzy Hash: 5161D0352043059FD310EF25D889FAABBE4EF85708F185519F856B72A1CB30DD89CBA2
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 00E169BE
                    • FindClose.KERNEL32(00000000), ref: 00E16A12
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E16A4E
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E16A75
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E16AB2
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E16ADF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                    • API String ID: 3830820486-3289030164
                    • Opcode ID: 60252bee5642f77202254e0ff2591d33c2397a167d65e0170f782f40986c175d
                    • Instruction ID: f7706b54fab98518ca4b8a67497de0c6fe53826ffa11b17fa30fd226d106cc36
                    • Opcode Fuzzy Hash: 60252bee5642f77202254e0ff2591d33c2397a167d65e0170f782f40986c175d
                    • Instruction Fuzzy Hash: CBD14CB2508300AEC714EBA4CC96EABB7ECEF89704F44491DF585D6191EB74DA48CB72
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,75701228,?,00000000), ref: 00E19663
                    • GetFileAttributesW.KERNEL32(?), ref: 00E196A1
                    • SetFileAttributesW.KERNEL32(?,?), ref: 00E196BB
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00E196D3
                    • FindClose.KERNEL32(00000000), ref: 00E196DE
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00E196FA
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E1974A
                    • SetCurrentDirectoryW.KERNEL32(00E66B7C), ref: 00E19768
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E19772
                    • FindClose.KERNEL32(00000000), ref: 00E1977F
                    • FindClose.KERNEL32(00000000), ref: 00E1978F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                    • String ID: *.*
                    • API String ID: 1409584000-438819550
                    • Opcode ID: 44d0d81bc65ef663a03a7ea1ca57374523cd224b25dbfa88890a874d12bfe003
                    • Instruction ID: 6c1c344e4fcee3d8fe60bd75dfa52b357098028a671c198c32ea42acc8a81fb5
                    • Opcode Fuzzy Hash: 44d0d81bc65ef663a03a7ea1ca57374523cd224b25dbfa88890a874d12bfe003
                    • Instruction Fuzzy Hash: F731A23254061A6EDB14AFB5EC5DADE7BAC9F09324F205196F815F30E1DB34D9848B24
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,75701228,?,00000000), ref: 00E197BE
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00E19819
                    • FindClose.KERNEL32(00000000), ref: 00E19824
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00E19840
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E19890
                    • SetCurrentDirectoryW.KERNEL32(00E66B7C), ref: 00E198AE
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E198B8
                    • FindClose.KERNEL32(00000000), ref: 00E198C5
                    • FindClose.KERNEL32(00000000), ref: 00E198D5
                      • Part of subcall function 00E0DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E0DB00
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                    • String ID: *.*
                    • API String ID: 2640511053-438819550
                    • Opcode ID: 57df03b351bfeaddb101a47cf5ef8929590daa772ab077c98fd705fe51907fd0
                    • Instruction ID: e611f6d213e6b8eb59111d8724ed283586bf4f56d369f89f19fc74750fa214e5
                    • Opcode Fuzzy Hash: 57df03b351bfeaddb101a47cf5ef8929590daa772ab077c98fd705fe51907fd0
                    • Instruction Fuzzy Hash: 0331C33254061A6EDB14AFB5EC58ADE7BACEF06324F2051A5E814B30A1DB30D9C9CB24
                    APIs
                      • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                      • Part of subcall function 00E0E199: GetFileAttributesW.KERNEL32(?,00E0CF95), ref: 00E0E19A
                    • FindFirstFileW.KERNEL32(?,?), ref: 00E0D122
                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00E0D1DD
                    • MoveFileW.KERNEL32 ref: 00E0D1F0
                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E0D20D
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E0D237
                      • Part of subcall function 00E0D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008), ref: 00E0D2B2
                    • FindClose.KERNEL32(00000000,?,?,?), ref: 00E0D253
                    • FindClose.KERNEL32(00000000), ref: 00E0D264
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                    • String ID: \*.*
                    • API String ID: 1946585618-1173974218
                    • Opcode ID: 4c11b5984a1c4614319e29d740da0d2a48858afe07bd152dbf79efd73530b00f
                    • Instruction ID: 98bb51478be6ec31e4f22c9cbbfcfeb606da7845bba1e1f501e24d26d2d000fa
                    • Opcode Fuzzy Hash: 4c11b5984a1c4614319e29d740da0d2a48858afe07bd152dbf79efd73530b00f
                    • Instruction Fuzzy Hash: B361393180511DAACF05EBE0DE929EEB7B5EF56304F249165E402771A1EB34AF49CB70
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                    • String ID:
                    • API String ID: 1737998785-0
                    • Opcode ID: 8c709212fb7ff441051e07a0f6ba549652ed0f91d1043d750ab77a56bc354920
                    • Instruction ID: c265a14f780c7ba13d4a5b5a15787391d2cfed90fdd7cfb3929819b6dfe209c9
                    • Opcode Fuzzy Hash: 8c709212fb7ff441051e07a0f6ba549652ed0f91d1043d750ab77a56bc354920
                    • Instruction Fuzzy Hash: 5841A035204611AFD310DF26E849F59BBE1EF84328F14D099F819AB762C735EC85CBA0
                    APIs
                      • Part of subcall function 00E016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E0170D
                      • Part of subcall function 00E016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E0173A
                      • Part of subcall function 00E016C3: GetLastError.KERNEL32 ref: 00E0174A
                    • ExitWindowsEx.USER32(?,00000000), ref: 00E0E932
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                    • String ID: $ $@$SeShutdownPrivilege
                    • API String ID: 2234035333-3163812486
                    • Opcode ID: 26b1173f39d2b0838d519ecdcff2810aa8f24f3b14fc2248b7990911ba0d7da8
                    • Instruction ID: 28e259dee0e615504e0b9bda722ef59c9add36e09d5638189df14a894e017fa5
                    • Opcode Fuzzy Hash: 26b1173f39d2b0838d519ecdcff2810aa8f24f3b14fc2248b7990911ba0d7da8
                    • Instruction Fuzzy Hash: F8012633610316AFEB5422B5AC8ABBB729CA754744F642D71FC02F22D1D5A19CC48290
                    APIs
                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E21276
                    • WSAGetLastError.WSOCK32 ref: 00E21283
                    • bind.WSOCK32(00000000,?,00000010), ref: 00E212BA
                    • WSAGetLastError.WSOCK32 ref: 00E212C5
                    • closesocket.WSOCK32(00000000), ref: 00E212F4
                    • listen.WSOCK32(00000000,00000005), ref: 00E21303
                    • WSAGetLastError.WSOCK32 ref: 00E2130D
                    • closesocket.WSOCK32(00000000), ref: 00E2133C
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLast$closesocket$bindlistensocket
                    • String ID:
                    • API String ID: 540024437-0
                    • Opcode ID: 6528cb2402748b00f1b86a98961a7c19f3f1774f2cf1bb8f53d18ed539755fde
                    • Instruction ID: 198ba7248e2d553168a82e51916759c2e72f7b8e5427aeddf4d746db32c00f6f
                    • Opcode Fuzzy Hash: 6528cb2402748b00f1b86a98961a7c19f3f1774f2cf1bb8f53d18ed539755fde
                    • Instruction Fuzzy Hash: 9341A531600110DFD714DF24D488B29BBE6EF56318F2890C8E856AF2A2C771EE85CBE1
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DB9A4E
                    • GetSysColor.USER32 ref: 00DB9B23
                    • SetBkColor.GDI32(?,00000000), ref: 00DB9B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Color$LongProcWindow
                    • String ID: 6ofs
                    • API String ID: 3131106179-1294211291
                    • Opcode ID: ca2c23792f1e8e36e7a2a15b3c5359ac73f7453ecb606182b1ba9ef55af3758e
                    • Instruction ID: 527a56fc104d1b97213299a8f7867eb97837d0042b1ec1ff179713de0c15980c
                    • Opcode Fuzzy Hash: ca2c23792f1e8e36e7a2a15b3c5359ac73f7453ecb606182b1ba9ef55af3758e
                    • Instruction Fuzzy Hash: 8EA13E70108588FEE728AA3D8CADEFBBA9DDF42350F1A4109F743E6691CA25DD41C275
                    APIs
                    • _free.LIBCMT ref: 00DDB9D4
                    • _free.LIBCMT ref: 00DDB9F8
                    • _free.LIBCMT ref: 00DDBB7F
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E43700), ref: 00DDBB91
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00E7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DDBC09
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00E71270,000000FF,?,0000003F,00000000,?), ref: 00DDBC36
                    • _free.LIBCMT ref: 00DDBD4B
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                    • String ID:
                    • API String ID: 314583886-0
                    • Opcode ID: 4272f946a3d7aa9f502bdae11e80166593676f8f57dcb53e608ebcf660f0b95a
                    • Instruction ID: 067dff094a34e5d48eca6ddd89cad7163f95662fc263b96f171834d6c3efd8a2
                    • Opcode Fuzzy Hash: 4272f946a3d7aa9f502bdae11e80166593676f8f57dcb53e608ebcf660f0b95a
                    • Instruction Fuzzy Hash: 7EC12471900245EFCB20DF799C41BAA7BA8EF41378F1A419BE494E7352EB709E419B70
                    APIs
                      • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                      • Part of subcall function 00E0E199: GetFileAttributesW.KERNEL32(?,00E0CF95), ref: 00E0E19A
                    • FindFirstFileW.KERNEL32(?,?), ref: 00E0D420
                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E0D470
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E0D481
                    • FindClose.KERNEL32(00000000), ref: 00E0D498
                    • FindClose.KERNEL32(00000000), ref: 00E0D4A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                    • String ID: \*.*
                    • API String ID: 2649000838-1173974218
                    • Opcode ID: 69d19d2526469603c18c96bf48e008f841a49a3accc85b14ad7f0e9faeb4f8d5
                    • Instruction ID: ec54e709ff8c0ee13ab799444e62d578298ccc32721ffe99d3cfa8ddb637698d
                    • Opcode Fuzzy Hash: 69d19d2526469603c18c96bf48e008f841a49a3accc85b14ad7f0e9faeb4f8d5
                    • Instruction Fuzzy Hash: 1B314F7100C3559FC204EF64D8558AFB7A8EE96314F445A1DF4E563191EB34EA09CB72
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: __floor_pentium4
                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                    • API String ID: 4168288129-2761157908
                    • Opcode ID: c9564c7e88fbff5919433aad068851432ecbd12489300fd1b00659bb98ef9c72
                    • Instruction ID: bd101aa680c0d9bcc117b28670d87b7831ed674ec6a106922f1278fa5e8040ec
                    • Opcode Fuzzy Hash: c9564c7e88fbff5919433aad068851432ecbd12489300fd1b00659bb98ef9c72
                    • Instruction Fuzzy Hash: 7CC22871E046298BDB25DF28DD407EAB7B5EB49304F1941EBD84EE7240E774AE818F60
                    APIs
                    • _wcslen.LIBCMT ref: 00E164DC
                    • CoInitialize.OLE32(00000000), ref: 00E16639
                    • CoCreateInstance.OLE32(00E3FCF8,00000000,00000001,00E3FB68,?), ref: 00E16650
                    • CoUninitialize.OLE32 ref: 00E168D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                    • String ID: .lnk
                    • API String ID: 886957087-24824748
                    • Opcode ID: daa01783e0f750ddc09387faca3310de92171d7c8dd705a357a5999cd6410f17
                    • Instruction ID: 4c294fd502dffbe045dd57b79e44c373b8f9e4b76311ad82f765b987ce113cf0
                    • Opcode Fuzzy Hash: daa01783e0f750ddc09387faca3310de92171d7c8dd705a357a5999cd6410f17
                    • Instruction Fuzzy Hash: 62D15971508301AFC304EF24C891EABB7E9FF95304F00496DF5959B291EB31E945CBA2
                    APIs
                    • GetForegroundWindow.USER32 ref: 00E222E8
                      • Part of subcall function 00E1E4EC: GetWindowRect.USER32(?,?), ref: 00E1E504
                    • GetDesktopWindow.USER32 ref: 00E22312
                    • GetWindowRect.USER32(00000000), ref: 00E22319
                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00E22355
                    • GetCursorPos.USER32(?), ref: 00E22381
                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E223DF
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                    • String ID:
                    • API String ID: 2387181109-0
                    • Opcode ID: 5acec5544e478bd2f29170ef748e51fb98a99a106cce6eec81476cbf0fb8989a
                    • Instruction ID: 2c51f2aba086ce9f43dce7140113ce483b3f3d5e391d03822f5fa8e8b29627d2
                    • Opcode Fuzzy Hash: 5acec5544e478bd2f29170ef748e51fb98a99a106cce6eec81476cbf0fb8989a
                    • Instruction Fuzzy Hash: 3231EF72104316AFCB20DF15D809A9BBBE9FF84314F101A1DF985B7181DB34E908CB92
                    APIs
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00E19B78
                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00E19C8B
                      • Part of subcall function 00E13874: GetInputState.USER32 ref: 00E138CB
                      • Part of subcall function 00E13874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E13966
                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00E19BA8
                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00E19C75
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                    • String ID: *.*
                    • API String ID: 1972594611-438819550
                    • Opcode ID: f2b867fd48072bcdcf72fea99d42ae1b0b3f878ac17484c8dae370b37bce70e3
                    • Instruction ID: 22eec255fe2122c7d115148c19ce1693e278a762d2cbf48faaa23fcb51bfbd20
                    • Opcode Fuzzy Hash: f2b867fd48072bcdcf72fea99d42ae1b0b3f878ac17484c8dae370b37bce70e3
                    • Instruction Fuzzy Hash: AF415F7190420A9FCF14DF64C899AEEBBF8EF05314F245156E855B7292EB309E84CFA4
                    APIs
                      • Part of subcall function 00E2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E2307A
                      • Part of subcall function 00E2304E: _wcslen.LIBCMT ref: 00E2309B
                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00E2185D
                    • WSAGetLastError.WSOCK32 ref: 00E21884
                    • bind.WSOCK32(00000000,?,00000010), ref: 00E218DB
                    • WSAGetLastError.WSOCK32 ref: 00E218E6
                    • closesocket.WSOCK32(00000000), ref: 00E21915
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                    • String ID:
                    • API String ID: 1601658205-0
                    • Opcode ID: c83851afa336b42fd7ba39a39183ad4a34852560e4e557694f2c003fdc84d098
                    • Instruction ID: f059009607b0675427c3695319a9053668859b60cb40770f9f79393c615bc2fa
                    • Opcode Fuzzy Hash: c83851afa336b42fd7ba39a39183ad4a34852560e4e557694f2c003fdc84d098
                    • Instruction Fuzzy Hash: 7D519371A002109FD714AF24D886F6A77E5EB45718F188498F9066F3D3D771EE418BB1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                    • API String ID: 0-1546025612
                    • Opcode ID: 1de3e8042257681a4d8c3273739c1930b6a645eb1deb463f9cd8a96426ef6f11
                    • Instruction ID: b23c0036b6d6ba2e9c7c95f3231a01600b350bce2be8cea11056bf7d6d5cb60a
                    • Opcode Fuzzy Hash: 1de3e8042257681a4d8c3273739c1930b6a645eb1deb463f9cd8a96426ef6f11
                    • Instruction Fuzzy Hash: 1BA2BE70E0025ACBDF24DF59C8407AEB7B1BF55354F2881AAEC55A7284EB70DD81DBA0
                    APIs
                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00E082AA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: lstrlen
                    • String ID: ($tb$|
                    • API String ID: 1659193697-1968160224
                    • Opcode ID: 86e3ca538ddb647754624c25910ba6c12db6f728c9a4add37ebfdc0f08b50cba
                    • Instruction ID: 5992c5387f556e7636c9f8e0ebcb3a737a3fb440e356aaf3cd54d0c001ada086
                    • Opcode Fuzzy Hash: 86e3ca538ddb647754624c25910ba6c12db6f728c9a4add37ebfdc0f08b50cba
                    • Instruction Fuzzy Hash: 55323774A00605DFC728CF19C581AAAB7F0FF48714B15D56EE49AEB3A1EB70E981CB50
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00E2A6AC
                    • Process32FirstW.KERNEL32(00000000,?), ref: 00E2A6BA
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • Process32NextW.KERNEL32(00000000,?), ref: 00E2A79C
                    • CloseHandle.KERNEL32(00000000), ref: 00E2A7AB
                      • Part of subcall function 00DBCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00DE3303,?), ref: 00DBCE8A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                    • String ID:
                    • API String ID: 1991900642-0
                    • Opcode ID: 44a4944bd2bd8aed2f4dd288181d0fd37389d6734b1707acd4066d78e151e1d1
                    • Instruction ID: 7e1d99c72004c12bca0c92b628d3da009c6ca07c1e24e5f1d7f97575abb8e5a4
                    • Opcode Fuzzy Hash: 44a4944bd2bd8aed2f4dd288181d0fd37389d6734b1707acd4066d78e151e1d1
                    • Instruction Fuzzy Hash: 49515F715083109FD714EF24D886A6BBBF8FF89754F04892DF585A7251EB30D904CBA2
                    APIs
                    • GetKeyboardState.USER32(?), ref: 00E0AAAC
                    • SetKeyboardState.USER32(00000080), ref: 00E0AAC8
                    • PostMessageW.USER32 ref: 00E0AB36
                    • SendInput.USER32(00000001,?,0000001C), ref: 00E0AB88
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: f7adced98155a1f83c0958878e5a3fe04ee1613560f65a50233371600f2c2e8b
                    • Instruction ID: ee9c2a0cfaa576eb77e0abc55f01deffe8ba2b10d78554193b428d5756391909
                    • Opcode Fuzzy Hash: f7adced98155a1f83c0958878e5a3fe04ee1613560f65a50233371600f2c2e8b
                    • Instruction Fuzzy Hash: 2C311631A4030CAEFB358B65CC09BFA7BA6AB44314F1C622AF081761D1D374C9C5CB62
                    APIs
                    • InternetReadFile.WININET(?,?,00000400,?), ref: 00E1CE89
                    • GetLastError.KERNEL32(?,00000000), ref: 00E1CEEA
                    • SetEvent.KERNEL32(?,?,00000000), ref: 00E1CEFE
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorEventFileInternetLastRead
                    • String ID:
                    • API String ID: 234945975-0
                    • Opcode ID: 9d374b23884dab0859a4f8be0a0b5cb5ef228500ad64d47253746d5dada37fe0
                    • Instruction ID: 28ea9371bd527b5671f8ad3a5001e28fdd9c239124b04db2cf57422203ae61ed
                    • Opcode Fuzzy Hash: 9d374b23884dab0859a4f8be0a0b5cb5ef228500ad64d47253746d5dada37fe0
                    • Instruction Fuzzy Hash: 3921B0B15407059FD720CFA5C948BEBBBF9EB00358F20441EE546F2151E774ED858B60
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 00DD271A
                    • SetUnhandledExceptionFilter.KERNEL32 ref: 00DD2724
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00DD2731
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 4bd3199d706cf0bcc94041bba1004fee7e6512ff645369dc7237ceaa79ddc0e7
                    • Instruction ID: 525031bce3d13dbe4b0f608c65fd3428e9e39c52d229b5994eea81104c5ab50b
                    • Opcode Fuzzy Hash: 4bd3199d706cf0bcc94041bba1004fee7e6512ff645369dc7237ceaa79ddc0e7
                    • Instruction Fuzzy Hash: 1731D57590121DABCB21DF64DC88B9DBBB8EF18310F5041EAE81CA7260E7349F858F54
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00E151DA
                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E15238
                    • SetErrorMode.KERNEL32(00000000), ref: 00E152A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorMode$DiskFreeSpace
                    • String ID:
                    • API String ID: 1682464887-0
                    • Opcode ID: aa06f5b6b59f2ec71f1b4e7d3af3bc934cbd1ec3caf2339061b428de8632e9eb
                    • Instruction ID: 90ab1dded918b42ed94f8203df44f84d2dc9b47b9c818a66f41ca88334662e81
                    • Opcode Fuzzy Hash: aa06f5b6b59f2ec71f1b4e7d3af3bc934cbd1ec3caf2339061b428de8632e9eb
                    • Instruction Fuzzy Hash: 53312F75A00518DFDB00DF55D884EADBBB4FF49318F148499E805AB3A2DB31E855CB60
                    APIs
                      • Part of subcall function 00DBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0668
                      • Part of subcall function 00DBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0685
                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E0170D
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E0173A
                    • GetLastError.KERNEL32 ref: 00E0174A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                    • String ID:
                    • API String ID: 577356006-0
                    • Opcode ID: 0a98eeba11b7af72698a07edf045aa8526cb555c27e18843ba772686fd68a25e
                    • Instruction ID: 40930c94c3708606c2276c2b53082c4e10ee67e5370fbb2712f29fbffcfe69cc
                    • Opcode Fuzzy Hash: 0a98eeba11b7af72698a07edf045aa8526cb555c27e18843ba772686fd68a25e
                    • Instruction Fuzzy Hash: 3E1191B2504308AFD7189F54DC86DAABBB9EB44714B24856EE05667281EB70FC858B30
                    APIs
                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E0D608
                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00E0D645
                    • CloseHandle.KERNEL32(?), ref: 00E0D650
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseControlCreateDeviceFileHandle
                    • String ID:
                    • API String ID: 33631002-0
                    • Opcode ID: 004d5542ce0b96e3dde26fdbe29f545130c2453d6797c10c9bdf4b258ca29076
                    • Instruction ID: 7c6921e5c5a90b538dd04dc469a9efca655945942c53a967ba2ff13165e8a9d3
                    • Opcode Fuzzy Hash: 004d5542ce0b96e3dde26fdbe29f545130c2453d6797c10c9bdf4b258ca29076
                    • Instruction Fuzzy Hash: AE113CB5E05228BFDB108F95AC49FAFBFBCEB45B50F108155F904F7290D6704A058BA1
                    APIs
                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00E0168C
                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E016A1
                    • FreeSid.ADVAPI32(?), ref: 00E016B1
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AllocateCheckFreeInitializeMembershipToken
                    • String ID:
                    • API String ID: 3429775523-0
                    • Opcode ID: 972ec387441f720f9818839504ce57ce3e32371b5d2ceb6416eed01f1cc476cd
                    • Instruction ID: 7eb83bd3e1512ceb1aa84b6e0472e9b958ea6f15690ae215d5c44299663cb64d
                    • Opcode Fuzzy Hash: 972ec387441f720f9818839504ce57ce3e32371b5d2ceb6416eed01f1cc476cd
                    • Instruction Fuzzy Hash: 00F0F47195030DFFDB00DFE59D89AAEBBBCEB08704F5045A5E501F2181E774EA489B50
                    APIs
                    • GetCurrentProcess.KERNEL32(00DD28E9,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002,00000000,?,00DD28E9), ref: 00DC4D09
                    • TerminateProcess.KERNEL32(00000000,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002,00000000,?,00DD28E9), ref: 00DC4D10
                    • ExitProcess.KERNEL32 ref: 00DC4D22
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: c929ae477fee482fedbd8d6ba88aae6ba07716d88731e82afc2adf28a784d0ba
                    • Instruction ID: f35ced797c49fb37468527411f3ba4d873d0d026c8ff60c08c2a883a63fcc890
                    • Opcode Fuzzy Hash: c929ae477fee482fedbd8d6ba88aae6ba07716d88731e82afc2adf28a784d0ba
                    • Instruction Fuzzy Hash: A6E0B631000149AFCF11BF65DD1EF983F69EB41791B244458FC06AB222CB35DD56DBA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: /
                    • API String ID: 0-2043925204
                    • Opcode ID: fcb9c897b8ecaf3949d957e262c8665e8bddb7cd662bd888ade69897a0c55467
                    • Instruction ID: 8664379b6443d8011f54a9f33464243a7faa7a53381fa499db6b403c3f1e34a8
                    • Opcode Fuzzy Hash: fcb9c897b8ecaf3949d957e262c8665e8bddb7cd662bd888ade69897a0c55467
                    • Instruction Fuzzy Hash: C9413B7650021AAFCB249FB9DC49EBB7BB8EB84354F14426EF905D7280E6709D41CB74
                    APIs
                    • GetUserNameW.ADVAPI32(?,?), ref: 00DFD28C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: NameUser
                    • String ID: X64
                    • API String ID: 2645101109-893830106
                    • Opcode ID: a505e34c9b0af0677d0a61bd6c34880a7634c8a4e3b9f73d30aab990a9d577a9
                    • Instruction ID: fc60fcc4df5954866ba61f169034f463bcf76f381e13f6bd42a57426b7cf9c8c
                    • Opcode Fuzzy Hash: a505e34c9b0af0677d0a61bd6c34880a7634c8a4e3b9f73d30aab990a9d577a9
                    • Instruction Fuzzy Hash: 7CD0C9B480111DEECB94DB90DC88DD9B77DBB04305F104151F146B2000D730D5488F20
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                    • Instruction ID: 5dc4bcfe422ef24fa7609d292c733694efee9fd176c218297720165655a5b44b
                    • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                    • Instruction Fuzzy Hash: 26021C71E1121A9BDF14CFA9C980BADBBF5EF48314F29416DE919E7380D731AD418B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: Variable is not of type 'Object'.$p#
                    • API String ID: 0-1086706999
                    • Opcode ID: a16f21dc9691b53f1d86e30c9de509f0285442cf2248da50c18488d52af32d32
                    • Instruction ID: c48620032df288a9e69c6cedbb703242eb4fa0a43a3785640cb5bcd65ae3aa98
                    • Opcode Fuzzy Hash: a16f21dc9691b53f1d86e30c9de509f0285442cf2248da50c18488d52af32d32
                    • Instruction Fuzzy Hash: 02327970910218DFCF14DF94C980AEDBBB5FF06324F189059E946AB292DB75AE46CB70
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 00E16918
                    • FindClose.KERNEL32(00000000), ref: 00E16961
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID:
                    • API String ID: 2295610775-0
                    • Opcode ID: 624631b2d3cfbcc27d60ed4c7137fa9860f937fc30ceba492bcb373aa7e76789
                    • Instruction ID: af7955df4f15386fd6391d09cdf1427beb4dad640d68e8e569d05c4fda79cd9a
                    • Opcode Fuzzy Hash: 624631b2d3cfbcc27d60ed4c7137fa9860f937fc30ceba492bcb373aa7e76789
                    • Instruction Fuzzy Hash: 721190716146109FC710DF29D888A16BBE5FF85328F14C699E8699F2A2C730EC45CBA1
                    APIs
                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00E24891,?,?,00000035,?), ref: 00E137E4
                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00E24891,?,?,00000035,?), ref: 00E137F4
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorFormatLastMessage
                    • String ID:
                    • API String ID: 3479602957-0
                    • Opcode ID: 9cd100a50045a5d4265b37a169cd90724b42c0a1f22e42096410ade53d7e948d
                    • Instruction ID: ef405d07b601ca1fda80bceb79e8bcbb7c870d822478bb72d812cd7cc00d8039
                    • Opcode Fuzzy Hash: 9cd100a50045a5d4265b37a169cd90724b42c0a1f22e42096410ade53d7e948d
                    • Instruction Fuzzy Hash: A9F0A0B16042282AE62027B68C4DFEB7AAEEF85761F000176B509F2291D960994487B0
                    APIs
                    • SendInput.USER32(00000001,?,0000001C), ref: 00E0B25D
                    • keybd_event.USER32 ref: 00E0B270
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: InputSendkeybd_event
                    • String ID:
                    • API String ID: 3536248340-0
                    • Opcode ID: feef35b030a5defbfe237d8700b84f5ab96dfec419911b5d0b5d94ae7f470cb5
                    • Instruction ID: c22010f879f744067c731708c5ef01cab0fe4d76b60983d53ed3782b2d60e6a4
                    • Opcode Fuzzy Hash: feef35b030a5defbfe237d8700b84f5ab96dfec419911b5d0b5d94ae7f470cb5
                    • Instruction Fuzzy Hash: 32F01D7180424EAFDB059FA1C805BEE7FB4FF08309F10900AF955B51A1C379C6559F94
                    APIs
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E011FC), ref: 00E010D4
                    • CloseHandle.KERNEL32(?), ref: 00E010E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AdjustCloseHandlePrivilegesToken
                    • String ID:
                    • API String ID: 81990902-0
                    • Opcode ID: 886207c32be02f321599811892a85d5035ec383dac455878961cd8043c8bd7c8
                    • Instruction ID: 4401d73f3755e7e912446ac5ce1e65528869c4b43298fc87b6f5fbcab046ccb5
                    • Opcode Fuzzy Hash: 886207c32be02f321599811892a85d5035ec383dac455878961cd8043c8bd7c8
                    • Instruction Fuzzy Hash: FBE0BF72018610EEE7252B51FC09EB77BE9EB04310F24886DF5A6944B5DB62ACA0DB60
                    APIs
                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DD6766,?,?,00000008,?,?,00DDFEFE,00000000), ref: 00DD6998
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ExceptionRaise
                    • String ID:
                    • API String ID: 3997070919-0
                    • Opcode ID: 8f5fae307ff53aaf4cfb55851413f2c361a8365dac30e8db35c8e70271e39d57
                    • Instruction ID: 5271265e494beb98268a852e84d995219e10829313e45c75f7d83f10c116b2b3
                    • Opcode Fuzzy Hash: 8f5fae307ff53aaf4cfb55851413f2c361a8365dac30e8db35c8e70271e39d57
                    • Instruction Fuzzy Hash: FCB148316106099FD719CF28C48AB657BE0FF45364F29865AE8D9CF3A2C335E985CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: 7d9f243a4cf490ef519f37e1d45eaf020f01de94938380e1bf38a36b690c85db
                    • Instruction ID: f4637cadb1d539d3cb07b7f0651101ccc5644528c6cf5a30ff646dd3e2c849b5
                    • Opcode Fuzzy Hash: 7d9f243a4cf490ef519f37e1d45eaf020f01de94938380e1bf38a36b690c85db
                    • Instruction Fuzzy Hash: 58124F71900229DFCB24CF58C8806FEB7F5FF48710F15819AE94AEB251DB709A85DBA1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: BlockInput
                    • String ID:
                    • API String ID: 3456056419-0
                    • Opcode ID: 06a1b1f424b4831fc386ce996ddd127ced4977ceb85d0f2c8d3214971f530423
                    • Instruction ID: edfdec75f51fbc4a9b7906d3535f01dcd773e91805dec382d5448c5fc4a69a09
                    • Opcode Fuzzy Hash: 06a1b1f424b4831fc386ce996ddd127ced4977ceb85d0f2c8d3214971f530423
                    • Instruction Fuzzy Hash: 45E012312102049FC710DF59D405D9AB7D9FF99770F009416FC45D7351D670E8418BA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0
                    • API String ID: 0-4108050209
                    • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                    • Instruction ID: 08e3c4b440333a6127c280463f5bb45b0c3220a7ddd148a95efb8d00f9b654e0
                    • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                    • Instruction Fuzzy Hash: A151677160C7075BDF388568885AFBE2799DF12340F5C060DEA86D7282CA21DE02EF72
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0&
                    • API String ID: 0-2523485602
                    • Opcode ID: 12f3384c890931e5dcf1a8cc5e4a905cc7afb8a3c18938652142926918026824
                    • Instruction ID: aee82a5adef8795560856ba42754d9f5952d5654683c0cbf16abe62d044dd27f
                    • Opcode Fuzzy Hash: 12f3384c890931e5dcf1a8cc5e4a905cc7afb8a3c18938652142926918026824
                    • Instruction Fuzzy Hash: 2321C3322206118BDB28CE79C8226BA73E5A754310F14862EE5A7E37D1DE39A944CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7fd70dd7a40e92f3bfaefd92cbf8659a1319d02f0944c381b454a6018a4456bc
                    • Instruction ID: 9690f7c0e2bb65d9adf50dc670f41b09fc50e65c90714702001e5a660b2bb7ff
                    • Opcode Fuzzy Hash: 7fd70dd7a40e92f3bfaefd92cbf8659a1319d02f0944c381b454a6018a4456bc
                    • Instruction Fuzzy Hash: 55325626D29F014DD7239639DC22335A689AFB73C5F55D73BF81AB5AA6EB28C4C34100
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: abeabae3535f41db37cfedafd2d6d6bcdf666dea581804c8f9f89099f2562560
                    • Instruction ID: acbd535803ef5b95d13d660951751869d3812f58a1d4e21666164617cadb60c1
                    • Opcode Fuzzy Hash: abeabae3535f41db37cfedafd2d6d6bcdf666dea581804c8f9f89099f2562560
                    • Instruction Fuzzy Hash: D0320731A2410DCBCF24CB29C6906BE7BA1FB45300F2EE566D69ADB291D630DD91DB70
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 277b14c9c32d3831dd212f89bf6588053cad1c9caaafed9f8c0e45bb58aa93e4
                    • Instruction ID: d6a6dcf4e9948749f87b83d506845ea6023bf32da0d374163a351c49d3982629
                    • Opcode Fuzzy Hash: 277b14c9c32d3831dd212f89bf6588053cad1c9caaafed9f8c0e45bb58aa93e4
                    • Instruction Fuzzy Hash: 1022DFB0A0060ADFDF14DF69D881AAEB3F5FF45344F144229E856A7291EB35E910CB70
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 37214b78fc3bb470299f1e4c5dc5555325874f3592a6b1bd55d5fc22772713fe
                    • Instruction ID: f68527fef743cce5b37441e79573fb1d7748b5447aba8ae0066f931ce516f7fb
                    • Opcode Fuzzy Hash: 37214b78fc3bb470299f1e4c5dc5555325874f3592a6b1bd55d5fc22772713fe
                    • Instruction Fuzzy Hash: BD02B6B0A00205EFDB04EF65D881AAEB7B5FF44300F548169F8569B291EB31EE15CBA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                    • Instruction ID: 112824f65b667d9c8f40fd614464d20acd2a3bf6a6b3b8be752736629b886bb8
                    • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                    • Instruction Fuzzy Hash: C691347A2090B349DB2D467A8574A3DFFE15A933A131E079DD4F2CB1C2FD24C9699A30
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 05c70dc5e8fea14cc072751cd6d8562b58c10847fcc1043a757002f831ba0b6a
                    • Instruction ID: b533b0f33a08db80ac92befa3fd7b0e7b5d20f2558c54baa6dbe3a90468fa850
                    • Opcode Fuzzy Hash: 05c70dc5e8fea14cc072751cd6d8562b58c10847fcc1043a757002f831ba0b6a
                    • Instruction Fuzzy Hash: 1E61487160870BA6DF349A288995FBE2396DF41710F28091EE886DB281DA21DE42DF75
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                    • Instruction ID: 83b40f152af216c6ff74778548d627eeea480edb083f519b75906588a5dce992
                    • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                    • Instruction Fuzzy Hash: 4781417A5090B349DB6942398574A3EFFE15E933A131E079DD4F2CB1C2EE24C558EA30
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 00E22B30
                    • DeleteObject.GDI32(00000000), ref: 00E22B43
                    • DestroyWindow.USER32 ref: 00E22B52
                    • GetDesktopWindow.USER32 ref: 00E22B6D
                    • GetWindowRect.USER32(00000000), ref: 00E22B74
                    • SetRect.USER32 ref: 00E22CA3
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00E22CB1
                    • CreateWindowExW.USER32 ref: 00E22CF8
                    • GetClientRect.USER32 ref: 00E22D04
                    • CreateWindowExW.USER32 ref: 00E22D40
                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00E22D62
                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22D75
                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22D80
                    • GlobalLock.KERNEL32 ref: 00E22D89
                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00E22D98
                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22DA1
                    • CloseHandle.KERNEL32(00000000), ref: 00E22DA8
                    • GlobalFree.KERNEL32(00000000), ref: 00E22DB3
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00E22DC5
                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E3FC38,00000000), ref: 00E22DDB
                    • GlobalFree.KERNEL32(00000000), ref: 00E22DEB
                    • CopyImage.USER32 ref: 00E22E11
                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00E22E30
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00E22E52
                    • ShowWindow.USER32(00000004), ref: 00E2303F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                    • String ID: $AutoIt v3$DISPLAY$static
                    • API String ID: 2211948467-2373415609
                    • Opcode ID: 7568e16b852255aeacfef4781d868ee71e03fa5e461c7b98c3bdbe13dc3eab0e
                    • Instruction ID: b5faf29f61f1843a937d49218d63109f88bcc14af6a427951dc5e07a8066f907
                    • Opcode Fuzzy Hash: 7568e16b852255aeacfef4781d868ee71e03fa5e461c7b98c3bdbe13dc3eab0e
                    • Instruction Fuzzy Hash: DA028971A00218AFDB14DFA5DC89EAE7BB9EF49710F148158F915BB2A1CB30ED05CB60
                    APIs
                    • SetTextColor.GDI32(?,00000000), ref: 00E3712F
                    • GetSysColorBrush.USER32 ref: 00E37160
                    • GetSysColor.USER32 ref: 00E3716C
                    • SetBkColor.GDI32(?,000000FF), ref: 00E37186
                    • SelectObject.GDI32(?,?), ref: 00E37195
                    • InflateRect.USER32 ref: 00E371C0
                    • GetSysColor.USER32 ref: 00E371C8
                    • CreateSolidBrush.GDI32(00000000), ref: 00E371CF
                    • FrameRect.USER32 ref: 00E371DE
                    • DeleteObject.GDI32(00000000), ref: 00E371E5
                    • InflateRect.USER32 ref: 00E37230
                    • FillRect.USER32 ref: 00E37262
                    • GetWindowLongW.USER32(?,000000F0), ref: 00E37284
                      • Part of subcall function 00E373E8: GetSysColor.USER32 ref: 00E37421
                      • Part of subcall function 00E373E8: SetTextColor.GDI32(?,?), ref: 00E37425
                      • Part of subcall function 00E373E8: GetSysColorBrush.USER32 ref: 00E3743B
                      • Part of subcall function 00E373E8: GetSysColor.USER32 ref: 00E37446
                      • Part of subcall function 00E373E8: GetSysColor.USER32 ref: 00E37463
                      • Part of subcall function 00E373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E37471
                      • Part of subcall function 00E373E8: SelectObject.GDI32(?,00000000), ref: 00E37482
                      • Part of subcall function 00E373E8: SetBkColor.GDI32(?,00000000), ref: 00E3748B
                      • Part of subcall function 00E373E8: SelectObject.GDI32(?,?), ref: 00E37498
                      • Part of subcall function 00E373E8: InflateRect.USER32 ref: 00E374B7
                      • Part of subcall function 00E373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E374CE
                      • Part of subcall function 00E373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00E374DB
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                    • String ID:
                    • API String ID: 4124339563-0
                    • Opcode ID: 38cf0b7c1981f47fd249fd12a36ad41555b13602af67b443192e5bd0b6efc1e3
                    • Instruction ID: f991f3f040a383fec3e07cb8ba980d3a314775cc988da5339cbd2f717e63f91b
                    • Opcode Fuzzy Hash: 38cf0b7c1981f47fd249fd12a36ad41555b13602af67b443192e5bd0b6efc1e3
                    • Instruction Fuzzy Hash: 8CA18FB2009305BFDB109F61DC4CA6B7FA9FB49320F201A19F9A2B61E1D771E948DB51
                    APIs
                    • DestroyWindow.USER32 ref: 00DB8E14
                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00DF6AC5
                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00DF6AFE
                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00DF6F43
                      • Part of subcall function 00DB8F62: InvalidateRect.USER32(?,00000000,00000001), ref: 00DB8FC5
                    • SendMessageW.USER32(?,00001053), ref: 00DF6F7F
                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00DF6F96
                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DF6FAC
                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DF6FB7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                    • String ID: 0$Hiy
                    • API String ID: 2760611726-2872881916
                    • Opcode ID: c79864cb953d891a49d86df614a79686cf4d3b06572bfcee6347a982c374f13e
                    • Instruction ID: 6c7777c06aad7578616ec9e61f906502108f73e7cf4046e41ca6c8e92a7e0506
                    • Opcode Fuzzy Hash: c79864cb953d891a49d86df614a79686cf4d3b06572bfcee6347a982c374f13e
                    • Instruction Fuzzy Hash: F7128E31200205EFD725DF18C848BB5BBE5FF44301F198469F68AAB661CB32EC96DB61
                    APIs
                    • DestroyWindow.USER32 ref: 00E2273E
                    • SystemParametersInfoW.USER32 ref: 00E2286A
                    • SetRect.USER32 ref: 00E228A9
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00E228B9
                    • CreateWindowExW.USER32 ref: 00E22900
                    • GetClientRect.USER32 ref: 00E2290C
                    • CreateWindowExW.USER32 ref: 00E22955
                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E22964
                    • GetStockObject.GDI32(00000011), ref: 00E22974
                    • SelectObject.GDI32(00000000,00000000), ref: 00E22978
                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 00E22988
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E22991
                    • DeleteDC.GDI32(00000000), ref: 00E2299A
                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E229C6
                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E229DD
                    • CreateWindowExW.USER32 ref: 00E22A1D
                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E22A31
                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E22A42
                    • CreateWindowExW.USER32 ref: 00E22A77
                    • GetStockObject.GDI32(00000011), ref: 00E22A82
                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E22A8D
                    • ShowWindow.USER32(00000004), ref: 00E22A97
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                    • API String ID: 2910397461-517079104
                    • Opcode ID: 9299a10a2226e32b529b7f56beb073a803d200bae9ddb7e04820ba319aab7586
                    • Instruction ID: 8a29d66912693f5e948a3e2d7c7d27e2a92b4850af7c9ecec4be8fdc7f608554
                    • Opcode Fuzzy Hash: 9299a10a2226e32b529b7f56beb073a803d200bae9ddb7e04820ba319aab7586
                    • Instruction Fuzzy Hash: 3EB15B71A40219BFEB14DF69DC8AEAE7BA9EB08710F104159FA14F7290D770ED44CBA0
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00E14AED
                    • GetDriveTypeW.KERNEL32(?,00E3CB68,?,\\.\,00E3CC08), ref: 00E14BCA
                    • SetErrorMode.KERNEL32(00000000,00E3CB68,?,\\.\,00E3CC08), ref: 00E14D36
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorMode$DriveType
                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                    • API String ID: 2907320926-4222207086
                    • Opcode ID: 3f2f1a23cd1fdd4f158cd966683168fef4cc4a51ef1673e14a0de56b490b9791
                    • Instruction ID: dd2342e92822f00818a3eb1d569c7c46b51c4c87959a7db79c27f4328485aad9
                    • Opcode Fuzzy Hash: 3f2f1a23cd1fdd4f158cd966683168fef4cc4a51ef1673e14a0de56b490b9791
                    • Instruction Fuzzy Hash: E361C1B1645205DBDB04EF24DA82EE8F7A0EB45784B24A415F806BB3D1DB31ED81DB91
                    APIs
                    • GetSysColor.USER32 ref: 00E37421
                    • SetTextColor.GDI32(?,?), ref: 00E37425
                    • GetSysColorBrush.USER32 ref: 00E3743B
                    • GetSysColor.USER32 ref: 00E37446
                    • CreateSolidBrush.GDI32(?), ref: 00E3744B
                    • GetSysColor.USER32 ref: 00E37463
                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E37471
                    • SelectObject.GDI32(?,00000000), ref: 00E37482
                    • SetBkColor.GDI32(?,00000000), ref: 00E3748B
                    • SelectObject.GDI32(?,?), ref: 00E37498
                    • InflateRect.USER32 ref: 00E374B7
                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E374CE
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00E374DB
                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E3752A
                    • GetWindowTextW.USER32 ref: 00E37554
                    • InflateRect.USER32 ref: 00E37572
                    • DrawFocusRect.USER32 ref: 00E3757D
                    • GetSysColor.USER32 ref: 00E3758E
                    • SetTextColor.GDI32(?,00000000), ref: 00E37596
                    • DrawTextW.USER32(?,00E370F5,000000FF,?,00000000), ref: 00E375A8
                    • SelectObject.GDI32(?,?), ref: 00E375BF
                    • DeleteObject.GDI32(?), ref: 00E375CA
                    • SelectObject.GDI32(?,?), ref: 00E375D0
                    • DeleteObject.GDI32(?), ref: 00E375D5
                    • SetTextColor.GDI32(?,?), ref: 00E375DB
                    • SetBkColor.GDI32(?,?), ref: 00E375E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                    • String ID:
                    • API String ID: 1996641542-0
                    • Opcode ID: d5edbfa9a1250ed6f2e07fea8065a29fad395bf29cbeb45a6569a94a9e6b0752
                    • Instruction ID: e5266882c478e960395173e75acff98e01d3a091ec4ee266e5af574aa0c031c0
                    • Opcode Fuzzy Hash: d5edbfa9a1250ed6f2e07fea8065a29fad395bf29cbeb45a6569a94a9e6b0752
                    • Instruction Fuzzy Hash: 31615972900218BFDF119FA5DC49AEEBFB9EB08320F214115F915BB2A1D775E940DBA0
                    APIs
                    • GetCursorPos.USER32(?), ref: 00E31128
                    • GetDesktopWindow.USER32 ref: 00E3113D
                    • GetWindowRect.USER32(00000000), ref: 00E31144
                    • GetWindowLongW.USER32(?,000000F0), ref: 00E31199
                    • DestroyWindow.USER32 ref: 00E311B9
                    • CreateWindowExW.USER32 ref: 00E311ED
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E3120B
                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E3121D
                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00E31232
                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00E31245
                    • IsWindowVisible.USER32(00000000), ref: 00E312A1
                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00E312BC
                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00E312D0
                    • GetWindowRect.USER32(00000000,?), ref: 00E312E8
                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00E3130E
                    • GetMonitorInfoW.USER32(00000000,?), ref: 00E31328
                    • CopyRect.USER32(?,?), ref: 00E3133F
                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 00E313AA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                    • String ID: ($0$tooltips_class32
                    • API String ID: 698492251-4156429822
                    • Opcode ID: cffc92992390e9a44ffbafc5b1cb2e8248332329437d00d844035902bb0ce423
                    • Instruction ID: 63bf5a47d6975251536ffea5ff16852df94b6dc34221d6b7d55a96a94bd153fd
                    • Opcode Fuzzy Hash: cffc92992390e9a44ffbafc5b1cb2e8248332329437d00d844035902bb0ce423
                    • Instruction Fuzzy Hash: D8B19D71604340AFD704DF65C889B6ABFE4FF84754F00895CF999AB2A1C731E844CBA2
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00E302E5
                    • _wcslen.LIBCMT ref: 00E3031F
                    • _wcslen.LIBCMT ref: 00E30389
                    • _wcslen.LIBCMT ref: 00E303F1
                    • _wcslen.LIBCMT ref: 00E30475
                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E304C5
                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E30504
                      • Part of subcall function 00DBF9F2: _wcslen.LIBCMT ref: 00DBF9FD
                      • Part of subcall function 00E0223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E02258
                      • Part of subcall function 00E0223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E0228A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$MessageSend$BuffCharUpper
                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                    • API String ID: 1103490817-719923060
                    • Opcode ID: 7dd9ffc309670e33e2e2f93322ca5ee46feccc547d7a28763ee0e80ce868244b
                    • Instruction ID: f245d56e61dd0af7e114343bf958180712646ec9ebaa21befed6568a28e912f3
                    • Opcode Fuzzy Hash: 7dd9ffc309670e33e2e2f93322ca5ee46feccc547d7a28763ee0e80ce868244b
                    • Instruction Fuzzy Hash: DEE1DD312082018FC714DF24C86586ABBE2FFC8758F14596CF896BB6A2DB30ED45CB61
                    APIs
                    • SystemParametersInfoW.USER32 ref: 00DB8968
                    • GetSystemMetrics.USER32 ref: 00DB8970
                    • SystemParametersInfoW.USER32 ref: 00DB899B
                    • GetSystemMetrics.USER32 ref: 00DB89A3
                    • GetSystemMetrics.USER32 ref: 00DB89C8
                    • SetRect.USER32 ref: 00DB89E5
                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00DB89F5
                    • CreateWindowExW.USER32 ref: 00DB8A28
                    • SetWindowLongW.USER32 ref: 00DB8A3C
                    • GetClientRect.USER32 ref: 00DB8A5A
                    • GetStockObject.GDI32(00000011), ref: 00DB8A76
                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DB8A81
                      • Part of subcall function 00DB912D: GetCursorPos.USER32(?), ref: 00DB9141
                      • Part of subcall function 00DB912D: ScreenToClient.USER32(00000000,?), ref: 00DB915E
                      • Part of subcall function 00DB912D: GetAsyncKeyState.USER32 ref: 00DB9183
                      • Part of subcall function 00DB912D: GetAsyncKeyState.USER32 ref: 00DB919D
                    • SetTimer.USER32(00000000,00000000,00000028,00DB90FC), ref: 00DB8AA8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                    • String ID: AutoIt v3 GUI
                    • API String ID: 1458621304-248962490
                    • Opcode ID: 6eb3bb3276524c9b2dfd716ccc3acb3d2dd7255099fcec208b7c664e3d4867e6
                    • Instruction ID: f0006c57c254f69ef66b9ad8fc901decf2579adf7cded3e3663ba1056c8e0d9d
                    • Opcode Fuzzy Hash: 6eb3bb3276524c9b2dfd716ccc3acb3d2dd7255099fcec208b7c664e3d4867e6
                    • Instruction Fuzzy Hash: 2EB17B35A00209EFDF14DF69DC49BEA3BB5FB48314F158229FA16A7290DB30E841CB61
                    APIs
                      • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E01114
                      • Part of subcall function 00E010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01120
                      • Part of subcall function 00E010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E0112F
                      • Part of subcall function 00E010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01136
                      • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E0114D
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E00DF5
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E00E29
                    • GetLengthSid.ADVAPI32(?), ref: 00E00E40
                    • GetAce.ADVAPI32(?,00000000,?), ref: 00E00E7A
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E00E96
                    • GetLengthSid.ADVAPI32(?), ref: 00E00EAD
                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E00EB5
                    • HeapAlloc.KERNEL32(00000000), ref: 00E00EBC
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E00EDD
                    • CopySid.ADVAPI32(00000000), ref: 00E00EE4
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E00F13
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E00F35
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E00F47
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00F6E
                    • HeapFree.KERNEL32(00000000), ref: 00E00F75
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00F7E
                    • HeapFree.KERNEL32(00000000), ref: 00E00F85
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00F8E
                    • HeapFree.KERNEL32(00000000), ref: 00E00F95
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00E00FA1
                    • HeapFree.KERNEL32(00000000), ref: 00E00FA8
                      • Part of subcall function 00E01193: GetProcessHeap.KERNEL32(00000008,00E00BB1,?,00000000,?,00E00BB1,?), ref: 00E011A1
                      • Part of subcall function 00E01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E00BB1,?), ref: 00E011A8
                      • Part of subcall function 00E01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E00BB1,?), ref: 00E011B7
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                    • String ID:
                    • API String ID: 4175595110-0
                    • Opcode ID: e0cfd281eaf3003df3c8d1c14e9c023e6275935d23c689facba1671a825f7234
                    • Instruction ID: 992f06df5cadb37eabe05ca1b1439cdcd9223bad4ec4ae191c19484a1f9b5e1d
                    • Opcode Fuzzy Hash: e0cfd281eaf3003df3c8d1c14e9c023e6275935d23c689facba1671a825f7234
                    • Instruction Fuzzy Hash: 5F716A72A0020AAFDF209FA5DC48FAEBBB8FF05305F144115FA59B6191D731DA89DB60
                    APIs
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2C4BD
                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E3CC08,00000000,?,00000000,?,?), ref: 00E2C544
                    • RegCloseKey.ADVAPI32(00000000), ref: 00E2C5A4
                    • _wcslen.LIBCMT ref: 00E2C5F4
                    • _wcslen.LIBCMT ref: 00E2C66F
                    • RegSetValueExW.ADVAPI32 ref: 00E2C6B2
                    • RegSetValueExW.ADVAPI32 ref: 00E2C7C1
                    • RegSetValueExW.ADVAPI32 ref: 00E2C84D
                    • RegCloseKey.ADVAPI32(?), ref: 00E2C881
                    • RegCloseKey.ADVAPI32(00000000), ref: 00E2C88E
                    • RegSetValueExW.ADVAPI32 ref: 00E2C960
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                    • API String ID: 9721498-966354055
                    • Opcode ID: ce1ed649926fd6859743770ff531504b2feef651b7451f2da054434121b76f85
                    • Instruction ID: c940b82e4559dfe964feeafbe99f20e883187023c53e43d2c4150f8e3cdaa327
                    • Opcode Fuzzy Hash: ce1ed649926fd6859743770ff531504b2feef651b7451f2da054434121b76f85
                    • Instruction Fuzzy Hash: EB127A356042119FC718DF24D891A2AB7E5FF89714F14885DF88AAB3A2DB31FC41CBA1
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00E309C6
                    • _wcslen.LIBCMT ref: 00E30A01
                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E30A54
                    • _wcslen.LIBCMT ref: 00E30A8A
                    • _wcslen.LIBCMT ref: 00E30B06
                    • _wcslen.LIBCMT ref: 00E30B81
                      • Part of subcall function 00DBF9F2: _wcslen.LIBCMT ref: 00DBF9FD
                      • Part of subcall function 00E02BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E02BFA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$MessageSend$BuffCharUpper
                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                    • API String ID: 1103490817-4258414348
                    • Opcode ID: 046d1818a792fea29eabeb9b364c30ac2f81ab5fa32e3316fd35b32bb6e23149
                    • Instruction ID: 6a2f88288510429a009f41c1ad233b05f43597f8d787c772625f19951ef4e3ba
                    • Opcode Fuzzy Hash: 046d1818a792fea29eabeb9b364c30ac2f81ab5fa32e3316fd35b32bb6e23149
                    • Instruction Fuzzy Hash: C8E1BC312083018FCB14EF24C46496ABBE1FF99358F10995CF896AB3A2D731ED45CBA1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$BuffCharUpper
                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                    • API String ID: 1256254125-909552448
                    • Opcode ID: 74a05c10c4e132be9b9e149163799ff70d484e498a2846bcc0255339dbe6eaad
                    • Instruction ID: 67e46c505cc41b9b6a1bf5c799d15846e5ff4837ee8d1c389734beaca6c70413
                    • Opcode Fuzzy Hash: 74a05c10c4e132be9b9e149163799ff70d484e498a2846bcc0255339dbe6eaad
                    • Instruction Fuzzy Hash: 5271077260053A8BCB20DE7CED525FE3391AFA1798B352528F856B7284EA71DD44C7B0
                    APIs
                    • _wcslen.LIBCMT ref: 00E3835A
                    • _wcslen.LIBCMT ref: 00E3836E
                    • _wcslen.LIBCMT ref: 00E38391
                    • _wcslen.LIBCMT ref: 00E383B4
                    • LoadImageW.USER32 ref: 00E383F2
                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00E35BF2), ref: 00E3844E
                    • LoadImageW.USER32 ref: 00E38487
                    • LoadImageW.USER32 ref: 00E384CA
                    • LoadImageW.USER32 ref: 00E38501
                    • FreeLibrary.KERNEL32(?), ref: 00E3850D
                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E3851D
                    • DestroyIcon.USER32(?,?,?,?,?,00E35BF2), ref: 00E3852C
                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E38549
                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E38555
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                    • String ID: .dll$.exe$.icl
                    • API String ID: 799131459-1154884017
                    • Opcode ID: 391aaf5d7ed19a71e61037cc3129e6ca94264e71c9061f8f4498305070929411
                    • Instruction ID: 24a9b21b497eed4babd8e7c499cef5c9224a78ac7577802a330187a56d5149a9
                    • Opcode Fuzzy Hash: 391aaf5d7ed19a71e61037cc3129e6ca94264e71c9061f8f4498305070929411
                    • Instruction Fuzzy Hash: C861DE71540319BEEB149F64CD49BBE7BA8EB08B20F105609F815F61D1DB74A984CBA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                    • API String ID: 0-1645009161
                    • Opcode ID: 1f8125df11f3f87f3f5c0b449641d7d028d521ccecfd3a8f047bac60758f52dd
                    • Instruction ID: f8c1b6ba441ac34b758699fdd541fbb18b4066f03c467a9da968b5dbc6468842
                    • Opcode Fuzzy Hash: 1f8125df11f3f87f3f5c0b449641d7d028d521ccecfd3a8f047bac60758f52dd
                    • Instruction Fuzzy Hash: F1810571A44706BBDB20BF61DC42FAE7BA8EF16340F084424F905AB196EB71DA11D7B1
                    APIs
                    • LoadIconW.USER32 ref: 00E05A2E
                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E05A40
                    • SetWindowTextW.USER32 ref: 00E05A57
                    • GetDlgItem.USER32(?,000003EA), ref: 00E05A6C
                    • SetWindowTextW.USER32 ref: 00E05A72
                    • GetDlgItem.USER32(?,000003E9), ref: 00E05A82
                    • SetWindowTextW.USER32 ref: 00E05A88
                    • SendDlgItemMessageW.USER32 ref: 00E05AA9
                    • SendDlgItemMessageW.USER32 ref: 00E05AC3
                    • GetWindowRect.USER32(?,?), ref: 00E05ACC
                    • _wcslen.LIBCMT ref: 00E05B33
                    • SetWindowTextW.USER32 ref: 00E05B6F
                    • GetDesktopWindow.USER32 ref: 00E05B75
                    • GetWindowRect.USER32(00000000), ref: 00E05B7C
                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00E05BD3
                    • GetClientRect.USER32 ref: 00E05BE0
                    • PostMessageW.USER32 ref: 00E05C05
                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E05C2F
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                    • String ID:
                    • API String ID: 895679908-0
                    • Opcode ID: d4d84140b94efcda2a7453f5021e700d34d3bead616d1c35cef45be2df083b0a
                    • Instruction ID: 91dcf5ef5acec5455deac1194a04495e97b2f52d3a42a7a0f2a2f85c424a16ce
                    • Opcode Fuzzy Hash: d4d84140b94efcda2a7453f5021e700d34d3bead616d1c35cef45be2df083b0a
                    • Instruction Fuzzy Hash: 52713C32900B09AFDB20DFA9CE89AAFBBF5FB48704F105519E542B25A0D775E984CF50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen
                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                    • API String ID: 176396367-1901692981
                    • Opcode ID: d32d56ffa2b6785b121699373356cdde5d15db7119bd0628b529b05cc2ad6654
                    • Instruction ID: ea53d03c21563dfcfa39e11d36f5004dd9120ca0ea0048bcdbc351ab1408c360
                    • Opcode Fuzzy Hash: d32d56ffa2b6785b121699373356cdde5d15db7119bd0628b529b05cc2ad6654
                    • Instruction Fuzzy Hash: D0E10832A005169BCB189FB8C8517EDFBB8FF44754F54A119E466B7290DB30AEC5CBA0
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    • DragQueryPoint.SHELL32(?,?), ref: 00E39147
                      • Part of subcall function 00E37674: ClientToScreen.USER32(?,?), ref: 00E3769A
                      • Part of subcall function 00E37674: GetWindowRect.USER32(?,?), ref: 00E37710
                      • Part of subcall function 00E37674: PtInRect.USER32(?,?,00E38B89), ref: 00E37720
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00E391B0
                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E391BB
                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E391DE
                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E39225
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00E3923E
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00E39255
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00E39277
                    • DragFinish.SHELL32(?), ref: 00E3927E
                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E39371
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$Hiy$p#
                    • API String ID: 221274066-1074881435
                    • Opcode ID: 17ad651ae7a51a6a5ac5715aa9df63226fff1ef7a6883ae3e8aef92868184863
                    • Instruction ID: d8c9d0168f42aadd0f60f2b88b2fc16454516542db8360b38aad40d3263b85ee
                    • Opcode Fuzzy Hash: 17ad651ae7a51a6a5ac5715aa9df63226fff1ef7a6883ae3e8aef92868184863
                    • Instruction Fuzzy Hash: 38618971108301AFC701EF65DC89DAFBBE8EF89750F101A1DF595A22A1DB70DA49CB62
                    APIs
                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00DC00C6
                      • Part of subcall function 00DC00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00E7070C,00000FA0,7A00FC7F,?,?,?,?,00DE23B3,000000FF), ref: 00DC011C
                      • Part of subcall function 00DC00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00DE23B3,000000FF), ref: 00DC0127
                      • Part of subcall function 00DC00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00DE23B3,000000FF), ref: 00DC0138
                      • Part of subcall function 00DC00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable,?,?,?,?,00DE23B3,000000FF), ref: 00DC014E
                      • Part of subcall function 00DC00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS,?,?,?,?,00DE23B3,000000FF), ref: 00DC015C
                      • Part of subcall function 00DC00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable,?,?,?,?,00DE23B3,000000FF), ref: 00DC016A
                      • Part of subcall function 00DC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DC0195
                      • Part of subcall function 00DC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DC01A0
                    • ___scrt_fastfail.LIBCMT ref: 00DC00E7
                      • Part of subcall function 00DC00A3: __onexit.LIBCMT ref: 00DC00A9
                    Strings
                    • WakeAllConditionVariable, xrefs: 00DC0162
                    • SleepConditionVariableCS, xrefs: 00DC0154
                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00DC0122
                    • InitializeConditionVariable, xrefs: 00DC0148
                    • kernel32.dll, xrefs: 00DC0133
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                    • API String ID: 66158676-1714406822
                    • Opcode ID: 43467ee80342c5c1770ee55c82a2abedb3faedb1436d975da11acbc616722923
                    • Instruction ID: e89803d181e149157b39dfb3b0b9803348d81cc48e3864cadcb590da0e6fd2b4
                    • Opcode Fuzzy Hash: 43467ee80342c5c1770ee55c82a2abedb3faedb1436d975da11acbc616722923
                    • Instruction Fuzzy Hash: DA21F932A45716EFD7116BA5AC0DF6A7FA4DB04B51F28012EF905F3291DBB0DC048AB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$BuffCharDriveLowerType
                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                    • API String ID: 2055661098-1000479233
                    • Opcode ID: 832cb046f53fa39d390c2fe8d9439b6ebc89a735f86b7f3e6588bb928afada1e
                    • Instruction ID: e5a3479feae986c62719b07488d4a164fe90a95aba225c27225f4764c0a2a6ff
                    • Opcode Fuzzy Hash: 832cb046f53fa39d390c2fe8d9439b6ebc89a735f86b7f3e6588bb928afada1e
                    • Instruction Fuzzy Hash: 1AB1D3B16083029FC710DF28C890AAAB7E5EF96768F50591DF496E73D1D730D984CB62
                    APIs
                    • DestroyWindow.USER32 ref: 00E36DEB
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                    • CreateWindowExW.USER32 ref: 00E36E5F
                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E36E81
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E36E94
                    • DestroyWindow.USER32 ref: 00E36EB5
                    • CreateWindowExW.USER32 ref: 00E36EE4
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E36EFD
                    • GetDesktopWindow.USER32 ref: 00E36F16
                    • GetWindowRect.USER32(00000000), ref: 00E36F1D
                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E36F35
                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E36F4D
                      • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                    • String ID: 0$Hiy$tooltips_class32
                    • API String ID: 2429346358-3820102389
                    • Opcode ID: daaf5406e61c5e6c88ce10f17a56513af3629a010ce94f0bc325cd1d20890c49
                    • Instruction ID: c037022fe44eff9399ef971734aacd10c7d0043806d6b3ba963e139d2918c70f
                    • Opcode Fuzzy Hash: daaf5406e61c5e6c88ce10f17a56513af3629a010ce94f0bc325cd1d20890c49
                    • Instruction Fuzzy Hash: E5716E74104344AFDB21CF29D848A66BBF9FB89708F14541DF699A7261C770E949CB22
                    APIs
                    • _wcslen.LIBCMT ref: 00E2B198
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B1B0
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B1D4
                    • _wcslen.LIBCMT ref: 00E2B200
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B214
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B236
                    • _wcslen.LIBCMT ref: 00E2B332
                      • Part of subcall function 00E105A7: GetStdHandle.KERNEL32(000000F6), ref: 00E105C6
                    • _wcslen.LIBCMT ref: 00E2B34B
                    • _wcslen.LIBCMT ref: 00E2B366
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E2B3B6
                    • GetLastError.KERNEL32(00000000), ref: 00E2B407
                    • CloseHandle.KERNEL32(?), ref: 00E2B439
                    • CloseHandle.KERNEL32(00000000), ref: 00E2B44A
                    • CloseHandle.KERNEL32(00000000), ref: 00E2B45C
                    • CloseHandle.KERNEL32(00000000), ref: 00E2B46E
                    • CloseHandle.KERNEL32(?), ref: 00E2B4E3
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                    • String ID:
                    • API String ID: 2178637699-0
                    • Opcode ID: 44b57484b2a69524b44c3941593f3aeb2ea6f8285e205085123e26933e97b581
                    • Instruction ID: 1e1683503e07ecd56560dfa2a052a159f9f453e14c0e1a1f276af6c4d0b34cf8
                    • Opcode Fuzzy Hash: 44b57484b2a69524b44c3941593f3aeb2ea6f8285e205085123e26933e97b581
                    • Instruction Fuzzy Hash: 5BF19A31604310DFC714EF24D891B6ABBE1EF85314F18995DF899AB2A2DB70EC44CB62
                    APIs
                    • GetMenuItemCount.USER32(00E71990), ref: 00DE2F8D
                    • GetMenuItemCount.USER32(00E71990), ref: 00DE303D
                    • GetCursorPos.USER32(?), ref: 00DE3081
                    • SetForegroundWindow.USER32(00000000), ref: 00DE308A
                    • TrackPopupMenuEx.USER32 ref: 00DE309D
                    • PostMessageW.USER32 ref: 00DE30A9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                    • String ID: 0
                    • API String ID: 36266755-4108050209
                    • Opcode ID: 1e0caf1187d4f9fcb7aeee89b0b9d495e2aa4ae2956ad156a42e65ae30c6fafc
                    • Instruction ID: 6f377f4a4fc013debcf2b33dbd7793d9067e149e93323b4e90b7824821e5ff58
                    • Opcode Fuzzy Hash: 1e0caf1187d4f9fcb7aeee89b0b9d495e2aa4ae2956ad156a42e65ae30c6fafc
                    • Instruction Fuzzy Hash: AA712731640255BEEB219F2ACC49FAABF69FF01364F244206F5147A1E0C7B1ED54CBA0
                    APIs
                      • Part of subcall function 00DB8F62: InvalidateRect.USER32(?,00000000,00000001), ref: 00DB8FC5
                    • DestroyWindow.USER32 ref: 00DB8C81
                    • KillTimer.USER32 ref: 00DB8D1B
                    • DestroyAcceleratorTable.USER32 ref: 00DF6973
                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00DB8BBA,00000000,?), ref: 00DF69A1
                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00DB8BBA,00000000,?), ref: 00DF69B8
                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00DB8BBA,00000000), ref: 00DF69D4
                    • DeleteObject.GDI32(00000000), ref: 00DF69E6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                    • String ID: Hiy
                    • API String ID: 641708696-472783900
                    • Opcode ID: 5cb31e2751571b92b6b6e3a776ef43599bc5e31b62de8a40afc4c98422a09e23
                    • Instruction ID: e01c04fbd9792517b2a6734ffbb8507c255ad38147253de2217eea5d9e68b400
                    • Opcode Fuzzy Hash: 5cb31e2751571b92b6b6e3a776ef43599bc5e31b62de8a40afc4c98422a09e23
                    • Instruction Fuzzy Hash: 5D61AA31501704DFCB25CF2AC948BA57BF5FB40312F288559E287AA960CB71E885EF70
                    APIs
                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E1C4B0
                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E1C4C3
                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E1C4D7
                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E1C4F0
                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00E1C533
                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E1C549
                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E1C554
                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E1C584
                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E1C5DC
                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E1C5F0
                    • InternetCloseHandle.WININET(00000000), ref: 00E1C5FB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                    • String ID:
                    • API String ID: 3800310941-3916222277
                    • Opcode ID: 691c9106e149ca43702f8adc684ad757c8f7eeaeb6974a0284088c073ba34782
                    • Instruction ID: c3a83ce651cc9c78ea20da1a2468b853b02d1b59425b1e89bd3aa19b77f66f81
                    • Opcode Fuzzy Hash: 691c9106e149ca43702f8adc684ad757c8f7eeaeb6974a0284088c073ba34782
                    • Instruction Fuzzy Hash: E1513AB1540608BFDB218F65C988AFB7BFDFB08758F20541AF945F6210DB34E9889B61
                    APIs
                      • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                    • GetSysColor.USER32 ref: 00DB9862
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ColorLongWindow
                    • String ID: Hiy
                    • API String ID: 259745315-472783900
                    • Opcode ID: 1ea075921c9946edc8b5888eed08831aaa5008140900dd3db547b6f2e9f18ffb
                    • Instruction ID: 7095b14c09d451ecb02731ac1c404038077d2b803c4a951faec7a5e08670ce76
                    • Opcode Fuzzy Hash: 1ea075921c9946edc8b5888eed08831aaa5008140900dd3db547b6f2e9f18ffb
                    • Instruction Fuzzy Hash: 10419335104684EFDB215F399C58BF97B75AB06320F288659FAA6A72E1C731DC42DB30
                    APIs
                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00E38592
                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385A2
                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385AD
                    • CloseHandle.KERNEL32(00000000), ref: 00E385BA
                    • GlobalLock.KERNEL32 ref: 00E385C8
                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00E385D7
                    • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385E0
                    • CloseHandle.KERNEL32(00000000), ref: 00E385E7
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0), ref: 00E385F8
                    • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00E3FC38,?), ref: 00E38611
                    • GlobalFree.KERNEL32(00000000), ref: 00E38621
                    • GetObjectW.GDI32(?,00000018,?), ref: 00E38641
                    • CopyImage.USER32 ref: 00E38671
                    • DeleteObject.GDI32(?), ref: 00E38699
                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E386AF
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                    • String ID:
                    • API String ID: 3840717409-0
                    • Opcode ID: bfd8c638f0d643b3bd9989e6f851a51a2275a7432ab596c8ba440562ad1e9b5a
                    • Instruction ID: 3bcb69233a6fc6b3e037643f3ac7de8caeae0addde662d6867eb0aeb2e675f25
                    • Opcode Fuzzy Hash: bfd8c638f0d643b3bd9989e6f851a51a2275a7432ab596c8ba440562ad1e9b5a
                    • Instruction Fuzzy Hash: E541E875600208AFDB119FA6DD8DEAA7FB8EF89B15F208058F905F7260DB30D905DB60
                    APIs
                    • VariantInit.OLEAUT32(00000000), ref: 00E11502
                    • VariantCopy.OLEAUT32(?,?), ref: 00E1150B
                    • VariantClear.OLEAUT32(?), ref: 00E11517
                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00E115FB
                    • VarR8FromDec.OLEAUT32(?,?), ref: 00E11657
                    • VariantInit.OLEAUT32(?), ref: 00E11708
                    • SysFreeString.OLEAUT32(?), ref: 00E1178C
                    • VariantClear.OLEAUT32(?), ref: 00E117D8
                    • VariantClear.OLEAUT32(?), ref: 00E117E7
                    • VariantInit.OLEAUT32(00000000), ref: 00E11823
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                    • API String ID: 1234038744-3931177956
                    • Opcode ID: 935416ae074d561fe6c1eedf81949f476b9be48a2c84e0cefd0b65ce42fa4bb2
                    • Instruction ID: 502f2837f9e53c1879ddacde271b50bad60a7ae97dc05833d28e278fc59e6c3c
                    • Opcode Fuzzy Hash: 935416ae074d561fe6c1eedf81949f476b9be48a2c84e0cefd0b65ce42fa4bb2
                    • Instruction Fuzzy Hash: 0FD1EE31A00615EBDB109F65D885BFDB7B6FF45700F20819AE646BB280DB30ED84DB62
                    APIs
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                      • Part of subcall function 00E2C998: CharUpperBuffW.USER32(?,?), ref: 00E2C9B5
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2C9F1
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA68
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA9E
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2B6F4
                    • RegOpenKeyExW.ADVAPI32 ref: 00E2B772
                    • RegDeleteValueW.ADVAPI32 ref: 00E2B80A
                    • RegCloseKey.ADVAPI32(?), ref: 00E2B87E
                    • RegCloseKey.ADVAPI32(?), ref: 00E2B89C
                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00E2B8F2
                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E2B904
                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E2B922
                    • FreeLibrary.KERNEL32(00000000), ref: 00E2B983
                    • RegCloseKey.ADVAPI32(00000000), ref: 00E2B994
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                    • String ID: RegDeleteKeyExW$advapi32.dll
                    • API String ID: 146587525-4033151799
                    • Opcode ID: ec0ebe1d09b2e353d4a278bb74e43c18c8d7f56a93788c3c4ba65a46a21c0347
                    • Instruction ID: a5772e756933fc407dfab059a354c7d20caf6ffffc5aee9fcfb3f3d82a263ad0
                    • Opcode Fuzzy Hash: ec0ebe1d09b2e353d4a278bb74e43c18c8d7f56a93788c3c4ba65a46a21c0347
                    • Instruction Fuzzy Hash: D1C1BE30204211AFD714DF24D495F2ABBE5FF85318F18955CF59AAB2A2CB31EC45CBA1
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    • PostMessageW.USER32 ref: 00E38D5A
                    • GetFocus.USER32 ref: 00E38D6A
                    • GetDlgCtrlID.USER32 ref: 00E38D75
                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00E38E1D
                    • GetMenuItemInfoW.USER32 ref: 00E38ECF
                    • GetMenuItemCount.USER32(?), ref: 00E38EEC
                    • GetMenuItemID.USER32(?,00000000), ref: 00E38EFC
                    • GetMenuItemInfoW.USER32 ref: 00E38F2E
                    • GetMenuItemInfoW.USER32 ref: 00E38F70
                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E38FA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                    • String ID: 0$Hiy
                    • API String ID: 1026556194-2872881916
                    • Opcode ID: 620184b5a974e9c883e8f3927c8749cab8202f8a5d38713e668bed8505cd8ae1
                    • Instruction ID: 7314da0239becc8930ba6f4b82effcae8e97f53425c9487d96f01d0532f72102
                    • Opcode Fuzzy Hash: 620184b5a974e9c883e8f3927c8749cab8202f8a5d38713e668bed8505cd8ae1
                    • Instruction Fuzzy Hash: 69819C71604305AFDB20CF25CD88AABBFE9FB88718F141959F985B7291DB30D904CB62
                    APIs
                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E35504
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E35515
                    • CharNextW.USER32(00000158), ref: 00E35544
                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E35585
                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E3559B
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E355AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$CharNext
                    • String ID: Hiy
                    • API String ID: 1350042424-472783900
                    • Opcode ID: fd043c7955e68493c1af0ceed8a55c5377254b3e8aca46f01b5e06bef4b29f5e
                    • Instruction ID: f9e3a1f266c906f177a3335008143adc103ff14c62143567a80a86bc4d91cb50
                    • Opcode Fuzzy Hash: fd043c7955e68493c1af0ceed8a55c5377254b3e8aca46f01b5e06bef4b29f5e
                    • Instruction Fuzzy Hash: D8618B72900608EFDB20CF55CC89AFE7FB9EB0A724F105145F926B6390D7709A84DB61
                    APIs
                    • GetDC.USER32(00000000), ref: 00E225D8
                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00E225E8
                    • CreateCompatibleDC.GDI32(?), ref: 00E225F4
                    • SelectObject.GDI32(00000000,?), ref: 00E22601
                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00E2266D
                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00E226AC
                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00E226D0
                    • SelectObject.GDI32(?,?), ref: 00E226D8
                    • DeleteObject.GDI32(?), ref: 00E226E1
                    • DeleteDC.GDI32(?), ref: 00E226E8
                    • ReleaseDC.USER32(00000000,?), ref: 00E226F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                    • String ID: (
                    • API String ID: 2598888154-3887548279
                    • Opcode ID: c3e172f2d156d7f4f2d95459cf984d6236524528b3ba85a212e0c50f902db3c9
                    • Instruction ID: abcd70bbb89a89122d58a8ee6bef8e5d09aa4ad874617a917ec67d8d0485eb04
                    • Opcode Fuzzy Hash: c3e172f2d156d7f4f2d95459cf984d6236524528b3ba85a212e0c50f902db3c9
                    • Instruction Fuzzy Hash: 9F61D276D00219EFCB14CFA4D888AAEBBF5FF48310F208529EA55B7250D774A951DFA0
                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 00DDDAA1
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD659
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD66B
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD67D
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD68F
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6A1
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6B3
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6C5
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6D7
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6E9
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6FB
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD70D
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD71F
                      • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD731
                    • _free.LIBCMT ref: 00DDDA96
                      • Part of subcall function 00DD29C8: HeapFree.KERNEL32(00000000,00000000), ref: 00DD29DE
                      • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                    • _free.LIBCMT ref: 00DDDAB8
                    • _free.LIBCMT ref: 00DDDACD
                    • _free.LIBCMT ref: 00DDDAD8
                    • _free.LIBCMT ref: 00DDDAFA
                    • _free.LIBCMT ref: 00DDDB0D
                    • _free.LIBCMT ref: 00DDDB1B
                    • _free.LIBCMT ref: 00DDDB26
                    • _free.LIBCMT ref: 00DDDB5E
                    • _free.LIBCMT ref: 00DDDB65
                    • _free.LIBCMT ref: 00DDDB82
                    • _free.LIBCMT ref: 00DDDB9A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID:
                    • API String ID: 161543041-0
                    • Opcode ID: 647f0ba041e3c1d24d26c4bf6c677a6c66ea972734e722d28e6976284b1a94ac
                    • Instruction ID: f4060620117c392e0250281765c6beb7e209f2f4f608b34848027ef6e1f5bac2
                    • Opcode Fuzzy Hash: 647f0ba041e3c1d24d26c4bf6c677a6c66ea972734e722d28e6976284b1a94ac
                    • Instruction Fuzzy Hash: 26314A316446059FEF21AA39EC45B6A77EAFF20314F29941BE459D7391DB31AC409B30
                    APIs
                    • GetClassNameW.USER32(?,?,00000100), ref: 00E0369C
                    • _wcslen.LIBCMT ref: 00E036A7
                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00E03797
                    • GetClassNameW.USER32(?,?,00000400), ref: 00E0380C
                    • GetDlgCtrlID.USER32 ref: 00E0385D
                    • GetWindowRect.USER32(?,?), ref: 00E03882
                    • GetParent.USER32(?), ref: 00E038A0
                    • ScreenToClient.USER32(00000000), ref: 00E038A7
                    • GetClassNameW.USER32(?,?,00000100), ref: 00E03921
                    • GetWindowTextW.USER32 ref: 00E0395D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                    • String ID: %s%u
                    • API String ID: 4010501982-679674701
                    • Opcode ID: 10980aeb77b177cee4f1d915f961e9375d04b0be6b19057bad326f4baf6ff45f
                    • Instruction ID: b3657b6c9185cb0ed9b649571fd0057b432597ed9a647bb7e4eab1904f6b2c1e
                    • Opcode Fuzzy Hash: 10980aeb77b177cee4f1d915f961e9375d04b0be6b19057bad326f4baf6ff45f
                    • Instruction Fuzzy Hash: 3B91BE71204606AFD718DF34C885FAAF7ACFF44354F509629F999A21D0DB30EA85CBA1
                    APIs
                    • GetClassNameW.USER32(?,?,00000400), ref: 00E04994
                    • GetWindowTextW.USER32 ref: 00E049DA
                    • _wcslen.LIBCMT ref: 00E049EB
                    • CharUpperBuffW.USER32(?,00000000), ref: 00E049F7
                    • _wcsstr.LIBVCRUNTIME ref: 00E04A2C
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00E04A64
                    • GetWindowTextW.USER32 ref: 00E04A9D
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00E04AE6
                    • GetClassNameW.USER32(?,?,00000400), ref: 00E04B20
                    • GetWindowRect.USER32(?,?), ref: 00E04B8B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                    • String ID: ThumbnailClass
                    • API String ID: 1311036022-1241985126
                    • Opcode ID: b3c07acf4dac08a26bd5312bee0109515cbcad0fb73b5ae96135559540095c37
                    • Instruction ID: d74686f322de3a1b76a5ae18d071f5cef4facac108aae9885ae4525ba2de3dcb
                    • Opcode Fuzzy Hash: b3c07acf4dac08a26bd5312bee0109515cbcad0fb73b5ae96135559540095c37
                    • Instruction Fuzzy Hash: 829190F11042059FDB04DF14CA85BAAB7E8EF84758F045469FE85AA0D6EB30ED85CBA1
                    APIs
                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E33A9D
                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E33AA0
                    • GetWindowLongW.USER32(?,000000F0), ref: 00E33AC7
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E33AEA
                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E33B62
                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00E33BAC
                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00E33BC7
                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00E33BE2
                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00E33BF6
                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00E33C13
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$LongWindow
                    • String ID: Hiy
                    • API String ID: 312131281-472783900
                    • Opcode ID: 16827d49649291faec0f69306d9af8bb8f966174be73de100a78a8eb8e64e769
                    • Instruction ID: dc60c32391494f27787190a3916148bb434dea2afdf004e1cac813995ea612a9
                    • Opcode Fuzzy Hash: 16827d49649291faec0f69306d9af8bb8f966174be73de100a78a8eb8e64e769
                    • Instruction Fuzzy Hash: 0F616A75900248AFDB10DF68CC85EEEBBF8EB49704F105199FA15B72A2C770AE45DB60
                    APIs
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00E2CC64
                    • RegOpenKeyExW.ADVAPI32 ref: 00E2CC8D
                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E2CD48
                      • Part of subcall function 00E2CC34: RegCloseKey.ADVAPI32(?), ref: 00E2CCAA
                      • Part of subcall function 00E2CC34: LoadLibraryA.KERNEL32(advapi32.dll), ref: 00E2CCBD
                      • Part of subcall function 00E2CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW,?,?,00000000), ref: 00E2CCCF
                      • Part of subcall function 00E2CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E2CD05
                      • Part of subcall function 00E2CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00E2CD28
                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E2CCF3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                    • String ID: RegDeleteKeyExW$advapi32.dll
                    • API String ID: 2734957052-4033151799
                    • Opcode ID: c32e0c8974fffe7d9fbba8f103ee3b72ffb58d36342ece44c899864f698c1746
                    • Instruction ID: c4c0cb8f92b9313d329ffdc1b204dc23b92d57506b195c5fb14fc3ed505ad77d
                    • Opcode Fuzzy Hash: c32e0c8974fffe7d9fbba8f103ee3b72ffb58d36342ece44c899864f698c1746
                    • Instruction Fuzzy Hash: 8A316B76901128BBDB208B61EC88EEFBF7CEF05744F200165A905F3240DA749A49EBA0
                    APIs
                    • timeGetTime.WINMM ref: 00E0E6B4
                      • Part of subcall function 00DBE551: timeGetTime.WINMM ref: 00DBE555
                    • Sleep.KERNEL32(0000000A), ref: 00E0E6E1
                    • EnumThreadWindows.USER32 ref: 00E0E705
                    • FindWindowExW.USER32 ref: 00E0E727
                    • SetActiveWindow.USER32 ref: 00E0E746
                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E0E754
                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E0E773
                    • Sleep.KERNEL32(000000FA), ref: 00E0E77E
                    • IsWindow.USER32 ref: 00E0E78A
                    • EndDialog.USER32 ref: 00E0E79B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                    • String ID: BUTTON
                    • API String ID: 1194449130-3405671355
                    • Opcode ID: 9fc3c274ad9052070c84eaceb06da66974da9ed2eaaa4095c6cd847b309d2dbf
                    • Instruction ID: ff38a3eafc2b2ffd70fd471719bb72ebcad1a3d82447c21b7493cd1867ced1fc
                    • Opcode Fuzzy Hash: 9fc3c274ad9052070c84eaceb06da66974da9ed2eaaa4095c6cd847b309d2dbf
                    • Instruction Fuzzy Hash: 79216570200205BFEB00AF66FC8DA253F69E75474DF242836F51AB12E1DB71DC889B25
                    APIs
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E0EA5D
                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E0EA73
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E0EA84
                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E0EA96
                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E0EAA7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: SendString$_wcslen
                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                    • API String ID: 2420728520-1007645807
                    • Opcode ID: ce0fb216da3327167ebd3a622d8d5765c23473c22c0b99238e94718402302761
                    • Instruction ID: c7919ab28f725f1a53b208f48a0fc7fc41a9b76708d31d0054b83798e7dca5d9
                    • Opcode Fuzzy Hash: ce0fb216da3327167ebd3a622d8d5765c23473c22c0b99238e94718402302761
                    • Instruction Fuzzy Hash: 67117731A9035979D710A765EC4ADFF6B7CEBD6B44F041839B801B20D1EFB04945CAB0
                    APIs
                    • GetSysColorBrush.USER32 ref: 00DA2D07
                    • RegisterClassExW.USER32(00000030), ref: 00DA2D31
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA2D42
                    • InitCommonControlsEx.COMCTL32(?), ref: 00DA2D5F
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DA2D6F
                    • LoadIconW.USER32 ref: 00DA2D85
                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DA2D94
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: bfb206f5fa2bc980844ac9bfc3f796671ba298ec289daf7c9af3e6b8caa22bec
                    • Instruction ID: 19363b5fd80c69d4fb51011cb1170fdc676cd3d63d5b7e9f1e68ace783f1d8f5
                    • Opcode Fuzzy Hash: bfb206f5fa2bc980844ac9bfc3f796671ba298ec289daf7c9af3e6b8caa22bec
                    • Instruction Fuzzy Hash: 2C21E7B5911308AFDB00DFA9E849BDDBFB4FB48700F10415AFA15B6290D7B18549CF90
                    APIs
                    • GetDlgItem.USER32(?,00000001), ref: 00E05CE2
                    • GetWindowRect.USER32(00000000,?), ref: 00E05CFB
                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004), ref: 00E05D59
                    • GetDlgItem.USER32(?,00000002), ref: 00E05D69
                    • GetWindowRect.USER32(00000000,?), ref: 00E05D7B
                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004), ref: 00E05DCF
                    • GetDlgItem.USER32(?,000003E9), ref: 00E05DDD
                    • GetWindowRect.USER32(00000000,?), ref: 00E05DEF
                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00E05E31
                    • GetDlgItem.USER32(?,000003EA), ref: 00E05E44
                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E05E5A
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00E05E67
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$ItemMoveRect$Invalidate
                    • String ID:
                    • API String ID: 3096461208-0
                    • Opcode ID: d3817b595ee6a86ba933607f7fbc073ddd551eee520bb8ddc0c1a7e584b6ef01
                    • Instruction ID: 3c6354c68c286421fe4639ff61b9310c5e980200c77201fbef931016056d2a1e
                    • Opcode Fuzzy Hash: d3817b595ee6a86ba933607f7fbc073ddd551eee520bb8ddc0c1a7e584b6ef01
                    • Instruction Fuzzy Hash: C6511CB1A00619AFDB18CF69DD89AAEBBB5EB48700F209129F915F6290D770DE44CF50
                    APIs
                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00E35186
                    • ShowWindow.USER32(?,00000000), ref: 00E351C7
                    • ShowWindow.USER32(?,00000005), ref: 00E351CD
                    • SetFocus.USER32 ref: 00E351D1
                      • Part of subcall function 00E36FBA: DeleteObject.GDI32(00000000), ref: 00E36FE6
                    • GetWindowLongW.USER32(?,000000F0), ref: 00E3520D
                    • SetWindowLongW.USER32 ref: 00E3521A
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00E3524D
                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00E35287
                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00E35296
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                    • String ID: Hiy
                    • API String ID: 3210457359-472783900
                    • Opcode ID: 7ffb33acba5d5661ebbfe6183c761c1d6d807589128eef83013fa34b75b7e216
                    • Instruction ID: 3c9df636e345007ec1a52bad583dfc06bdf3de85da35d4e51c39fefcc034488d
                    • Opcode Fuzzy Hash: 7ffb33acba5d5661ebbfe6183c761c1d6d807589128eef83013fa34b75b7e216
                    • Instruction Fuzzy Hash: B451BD32A41A08BEEF209F25CC4EBD93FB5EB05324F246402FA15B63E0C771A984DB51
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                      • Part of subcall function 00DB912D: GetCursorPos.USER32(?), ref: 00DB9141
                      • Part of subcall function 00DB912D: ScreenToClient.USER32(00000000,?), ref: 00DB915E
                      • Part of subcall function 00DB912D: GetAsyncKeyState.USER32 ref: 00DB9183
                      • Part of subcall function 00DB912D: GetAsyncKeyState.USER32 ref: 00DB919D
                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00E38B6B
                    • ImageList_EndDrag.COMCTL32 ref: 00E38B71
                    • ReleaseCapture.USER32 ref: 00E38B77
                    • SetWindowTextW.USER32 ref: 00E38C12
                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E38C25
                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00E38CFF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                    • String ID: @GUI_DRAGFILE$@GUI_DROPID$Hiy$p#
                    • API String ID: 1924731296-3569028619
                    • Opcode ID: b2e461767f5b73a4d733ffe416b706664310f641efbca36d5532666ed3656670
                    • Instruction ID: af4e7a186c9999b91e533c1d04cd54d52d67910075ba302962799c1f3667cc82
                    • Opcode Fuzzy Hash: b2e461767f5b73a4d733ffe416b706664310f641efbca36d5532666ed3656670
                    • Instruction Fuzzy Hash: 1451AD71204304AFD704DF24DC5AFAABBE4FB88754F10166DF996672E1CB70A948CB62
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00DEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00E09717
                    • LoadStringW.USER32(00000000,?,00DEF7F8,00000001), ref: 00E09720
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00DEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00E09742
                    • LoadStringW.USER32(00000000,?,00DEF7F8,00000001), ref: 00E09745
                    • MessageBoxW.USER32 ref: 00E09866
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString$Message_wcslen
                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                    • API String ID: 747408836-2268648507
                    • Opcode ID: 5533f93b19f527b991c77473dc1359be3d49e6040908b14bfa8b5818eeebb39b
                    • Instruction ID: 6d41abb5bab7aad471c3b2308a33e7363c7ca53fea3dc09b7f7f1dabd1580273
                    • Opcode Fuzzy Hash: 5533f93b19f527b991c77473dc1359be3d49e6040908b14bfa8b5818eeebb39b
                    • Instruction Fuzzy Hash: 4D413872800219AACF04EBE1DE96DEEB779EF56340F645025F60572092EB356F48CBB1
                    APIs
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E007A2
                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E007BE
                    • RegOpenKeyExW.ADVAPI32 ref: 00E007DA
                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00E00804
                    • CLSIDFromString.OLE32(?,000001FE), ref: 00E0082C
                    • RegCloseKey.ADVAPI32(?), ref: 00E00837
                    • RegCloseKey.ADVAPI32(?), ref: 00E0083C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                    • API String ID: 323675364-22481851
                    • Opcode ID: c98bc269f5f2a7a1b70cc96fa1522fdff35340b057fc134003509b0a846f04cc
                    • Instruction ID: 1027cfc6d76aa8ffc6cf68120b04f20b569b512bf7e0901359054d070b50f613
                    • Opcode Fuzzy Hash: c98bc269f5f2a7a1b70cc96fa1522fdff35340b057fc134003509b0a846f04cc
                    • Instruction Fuzzy Hash: D541E372810229AEDF15EBA4DC959EEB778FF44350F544129E911B31A1EB349E48CFA0
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 00E17AF3
                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E17B8F
                    • SHGetDesktopFolder.SHELL32(?), ref: 00E17BA3
                    • CoCreateInstance.OLE32(00E3FD08,00000000,00000001,00E66E6C,?), ref: 00E17BEF
                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E17C74
                    • CoTaskMemFree.OLE32(?), ref: 00E17CCC
                    • SHBrowseForFolderW.SHELL32(?), ref: 00E17D57
                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E17D7A
                    • CoTaskMemFree.OLE32(00000000), ref: 00E17D81
                    • CoTaskMemFree.OLE32(00000000), ref: 00E17DD6
                    • CoUninitialize.OLE32 ref: 00E17DDC
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                    • String ID:
                    • API String ID: 2762341140-0
                    • Opcode ID: 7da4aa78f684f7b049d21ebf1ffaa471a376f1fe8caa7f6f1b1893e7cb53f883
                    • Instruction ID: de28712b82f892f08d5dde120aa2035de6d0487a9e67858003f5aa3b15ead0f5
                    • Opcode Fuzzy Hash: 7da4aa78f684f7b049d21ebf1ffaa471a376f1fe8caa7f6f1b1893e7cb53f883
                    • Instruction Fuzzy Hash: 51C13C75A04109AFCB14DF64C888DAEBBF5FF49314B148499F456EB261D730EE85CBA0
                    APIs
                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00DFFAAF
                    • SafeArrayAllocData.OLEAUT32(?), ref: 00DFFB08
                    • VariantInit.OLEAUT32(?), ref: 00DFFB1A
                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00DFFB3A
                    • VariantCopy.OLEAUT32(?,?), ref: 00DFFB8D
                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00DFFBA1
                    • VariantClear.OLEAUT32(?), ref: 00DFFBB6
                    • SafeArrayDestroyData.OLEAUT32(?), ref: 00DFFBC3
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DFFBCC
                    • VariantClear.OLEAUT32(?), ref: 00DFFBDE
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DFFBE9
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                    • String ID:
                    • API String ID: 2706829360-0
                    • Opcode ID: 28f155cf5e134ff85f8f2725833f33346d7839bc700d7410649dc0ad3132a48d
                    • Instruction ID: 5d124668ccc71b161f3f2a10ec926389bc8467d8d55e572835918e68e4a78da3
                    • Opcode Fuzzy Hash: 28f155cf5e134ff85f8f2725833f33346d7839bc700d7410649dc0ad3132a48d
                    • Instruction Fuzzy Hash: B9414E35A0021D9FCB00DFA9D8589BEBBB9EF48354F11C069E956B7261CB30E945CBA0
                    APIs
                    • WSAStartup.WSOCK32(00000101,?), ref: 00E205BC
                    • inet_addr.WSOCK32(?), ref: 00E2061C
                    • gethostbyname.WSOCK32(?), ref: 00E20628
                    • IcmpCreateFile.IPHLPAPI ref: 00E20636
                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E206C6
                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E206E5
                    • IcmpCloseHandle.IPHLPAPI(?), ref: 00E207B9
                    • WSACleanup.WSOCK32 ref: 00E207BF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                    • String ID: Ping
                    • API String ID: 1028309954-2246546115
                    • Opcode ID: 3e1c589fd30d1f464dd6f325d90bf29736101b5c46ecde3b09c07d93e935e91e
                    • Instruction ID: 53a39667616e51b326dc763ce4d27fb52ed854f7fcae225fc2ae00209a473cc3
                    • Opcode Fuzzy Hash: 3e1c589fd30d1f464dd6f325d90bf29736101b5c46ecde3b09c07d93e935e91e
                    • Instruction Fuzzy Hash: B1919E356042119FD320DF25E888F1ABBE0EF44318F1495AAF46AAB6A3C770ED45CF91
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$BuffCharLower
                    • String ID: cdecl$none$stdcall$winapi
                    • API String ID: 707087890-567219261
                    • Opcode ID: afadcc9d39006b1eee3ead5a09fa7b7c529ab4c6635dfc2b43c19367014cf64f
                    • Instruction ID: e9e82feb6cff75d05e9d02ab9fcac753c7c3ef06921e32dd2c0b5982ac9bff1d
                    • Opcode Fuzzy Hash: afadcc9d39006b1eee3ead5a09fa7b7c529ab4c6635dfc2b43c19367014cf64f
                    • Instruction Fuzzy Hash: CD51C032A011269BCB24DF68DE509BEB3A5FF65368B255229E426F72C4DF30DD44C7A0
                    APIs
                      • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                    • GetMenuItemInfoW.USER32 ref: 00E0C6EE
                    • _wcslen.LIBCMT ref: 00E0C735
                    • SetMenuItemInfoW.USER32 ref: 00E0C79C
                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E0C7CA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ItemMenu$Info_wcslen$Default
                    • String ID: 0$0Qy$0Qy$piy$piy
                    • API String ID: 1227352736-3983575569
                    • Opcode ID: cfaf879defb018a0c89e88ca8d71db281d4d05f6df1f11b87d9dff8708e5bd06
                    • Instruction ID: c00a6c18b0db4c150a45af6c9ec4470bafb112f2bba54dd9ec331eed1896a907
                    • Opcode Fuzzy Hash: cfaf879defb018a0c89e88ca8d71db281d4d05f6df1f11b87d9dff8708e5bd06
                    • Instruction Fuzzy Hash: F451C4716043019BD7149F38D845BAA77E4EF89718F28272EF595F31D0DB70D9848B62
                    APIs
                    • CoInitialize.OLE32 ref: 00E23774
                    • CoUninitialize.OLE32 ref: 00E2377F
                    • CoCreateInstance.OLE32(?,00000000,00000017,00E3FB78,?), ref: 00E237D9
                    • IIDFromString.OLE32(?,?), ref: 00E2384C
                    • VariantInit.OLEAUT32(?), ref: 00E238E4
                    • VariantClear.OLEAUT32(?), ref: 00E23936
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                    • API String ID: 636576611-1287834457
                    • Opcode ID: 174ae5996fcc3a3fe47308c67567870ef08ca5287a744cdfca1971bfd3dba2c1
                    • Instruction ID: a0dd5896207bfd41861ef5f5cff23ed9b690e63ab50a4816acb1b2e9a11c6d66
                    • Opcode Fuzzy Hash: 174ae5996fcc3a3fe47308c67567870ef08ca5287a744cdfca1971bfd3dba2c1
                    • Instruction Fuzzy Hash: EB61B270608311AFD714DF64E849F9ABBE4EF45714F10180AF585AB291D774EE88CFA2
                    APIs
                    • GetLocalTime.KERNEL32(?), ref: 00E18257
                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E18267
                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E18273
                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E18310
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E18324
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E18356
                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E1838C
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E18395
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CurrentDirectoryTime$File$Local$System
                    • String ID: *.*
                    • API String ID: 1464919966-438819550
                    • Opcode ID: 98990ad1254c50e99f7ee32560100f8d5e720f3369b73f5080dbedf48e25d0b9
                    • Instruction ID: e2e1623381117cd9c09ed1d36e6498fbb2e149a2396f10cd3935df0014243855
                    • Opcode Fuzzy Hash: 98990ad1254c50e99f7ee32560100f8d5e720f3369b73f5080dbedf48e25d0b9
                    • Instruction Fuzzy Hash: 1A616C725043459FC710EF60C84499EB3E8FF89314F04491EF999A7251EB31E989CBA2
                    APIs
                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00E133CF
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E133F0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LoadString$_wcslen
                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                    • API String ID: 4099089115-3080491070
                    • Opcode ID: 4c1da01f96c32175f7ea6cdc1b242ed1f1377d661acacfef08324f7a75d523a3
                    • Instruction ID: 642aa09f6ab748528cce57bb866ffa00475694fa579202a6c1e80dc5b8425ec4
                    • Opcode Fuzzy Hash: 4c1da01f96c32175f7ea6cdc1b242ed1f1377d661acacfef08324f7a75d523a3
                    • Instruction Fuzzy Hash: 8C51AB72900209AADF15EBE0DD46EEEB7B9EF05740F205065F409720A2EB316F98DB70
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$BuffCharUpper
                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                    • API String ID: 1256254125-769500911
                    • Opcode ID: 1432f1fefbd6e457032a15eeb736265729fa5403abad3b38b928d19ef4c3adad
                    • Instruction ID: 0f8b725b823dde625f4388644f011ebf1874033e883739b7860b9e36b7e18c03
                    • Opcode Fuzzy Hash: 1432f1fefbd6e457032a15eeb736265729fa5403abad3b38b928d19ef4c3adad
                    • Instruction Fuzzy Hash: 7D41A932A001279BCB105F7DD8915BE77A5FBA1758B25522AE461F72C4E732CDC1C7A0
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00E153A0
                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E15416
                    • GetLastError.KERNEL32 ref: 00E15420
                    • SetErrorMode.KERNEL32(00000000,READY), ref: 00E154A7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Error$Mode$DiskFreeLastSpace
                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                    • API String ID: 4194297153-14809454
                    • Opcode ID: f7a49d9cbe44ec03e363630542bcc90f1f3ffbeefb2711a4ce4fc6119de3648a
                    • Instruction ID: caef85d252e02af076c098d6222e3b1bc948d5dad70ed1ea4fc75d6339b284c2
                    • Opcode Fuzzy Hash: f7a49d9cbe44ec03e363630542bcc90f1f3ffbeefb2711a4ce4fc6119de3648a
                    • Instruction Fuzzy Hash: 0831C336A00504DFC710DF68D489BEABBB4EF85349F149066E416EB292D771DDC6CBA0
                    APIs
                    • GetCurrentThreadId.KERNEL32(?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B151
                    • GetForegroundWindow.USER32 ref: 00E0B165
                    • GetWindowThreadProcessId.USER32(00000000), ref: 00E0B16C
                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00E0B17B
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E0B18D
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E0B1A6
                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00E0B1B8
                    • AttachThreadInput.USER32(00000000,00000000), ref: 00E0B1FD
                    • AttachThreadInput.USER32(?,?,00000000), ref: 00E0B212
                    • AttachThreadInput.USER32(00000000,?,00000000), ref: 00E0B21D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                    • String ID:
                    • API String ID: 2156557900-0
                    • Opcode ID: a62cd7f2347c17a49f8939fd76ef92df3705d13a3ef17b982f6645115c4fa5a4
                    • Instruction ID: ecb84a836f5e587bc071222a1143e08a2734d487378b77e029edd6fd9256d7ce
                    • Opcode Fuzzy Hash: a62cd7f2347c17a49f8939fd76ef92df3705d13a3ef17b982f6645115c4fa5a4
                    • Instruction Fuzzy Hash: 74319E71500208BFDB10DF26EC49BAD7BAABB61715F205405FA09F61E0D7B4DAC88F60
                    APIs
                    • _free.LIBCMT ref: 00DD2C94
                      • Part of subcall function 00DD29C8: HeapFree.KERNEL32(00000000,00000000), ref: 00DD29DE
                      • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                    • _free.LIBCMT ref: 00DD2CA0
                    • _free.LIBCMT ref: 00DD2CAB
                    • _free.LIBCMT ref: 00DD2CB6
                    • _free.LIBCMT ref: 00DD2CC1
                    • _free.LIBCMT ref: 00DD2CCC
                    • _free.LIBCMT ref: 00DD2CD7
                    • _free.LIBCMT ref: 00DD2CE2
                    • _free.LIBCMT ref: 00DD2CED
                    • _free.LIBCMT ref: 00DD2CFB
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: d383c2c0a400541822cfca81d5b83a904295842fb4c101056e7a97850eaa41bb
                    • Instruction ID: 45ea96b86da200d62f7c737c65417aedd9534218a2b39fa0ccac32a01410737b
                    • Opcode Fuzzy Hash: d383c2c0a400541822cfca81d5b83a904295842fb4c101056e7a97850eaa41bb
                    • Instruction Fuzzy Hash: C3118076140108AFCB02EF54DC92CAD3BA9FF15350F4144A6FA489B322DB31EA50AFB0
                    APIs
                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00DA1459
                    • OleUninitialize.OLE32 ref: 00DA14F8
                    • UnregisterHotKey.USER32(?), ref: 00DA16DD
                    • DestroyWindow.USER32 ref: 00DE24B9
                    • FreeLibrary.KERNEL32(?), ref: 00DE251E
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00DE254B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                    • String ID: close all
                    • API String ID: 469580280-3243417748
                    • Opcode ID: 023afde676c2785dd21db42fce9871412389b1c71b65b415894856b74962b897
                    • Instruction ID: 0189fcd1ddef1521f8125b5db2391920a96be2c73ff679f3f150045a651b5a00
                    • Opcode Fuzzy Hash: 023afde676c2785dd21db42fce9871412389b1c71b65b415894856b74962b897
                    • Instruction Fuzzy Hash: FCD14A35701252CFCB19EF15C999A69F7A4BF46700F2942ADE44AAB251CB30ED12CF70
                    APIs
                    • SetWindowLongW.USER32 ref: 00DA5C7A
                      • Part of subcall function 00DA5D0A: GetClientRect.USER32 ref: 00DA5D30
                      • Part of subcall function 00DA5D0A: GetWindowRect.USER32(?,?), ref: 00DA5D71
                      • Part of subcall function 00DA5D0A: ScreenToClient.USER32(?,?), ref: 00DA5D99
                    • GetDC.USER32 ref: 00DE46F5
                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00DE4708
                    • SelectObject.GDI32(00000000,00000000), ref: 00DE4716
                    • SelectObject.GDI32(00000000,00000000), ref: 00DE472B
                    • ReleaseDC.USER32(?,00000000), ref: 00DE4733
                    • MoveWindow.USER32(?,?,?,?,?,?), ref: 00DE47C4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                    • String ID: U
                    • API String ID: 4009187628-3372436214
                    • Opcode ID: ff4a7508c05834da9fb66a768241bf09aa5f1db3cb37335c41551c5f1c4dc372
                    • Instruction ID: 456bda372acc82705eb0d097bd9cb31794b2342f849f5c0c73068a8878bc46e3
                    • Opcode Fuzzy Hash: ff4a7508c05834da9fb66a768241bf09aa5f1db3cb37335c41551c5f1c4dc372
                    • Instruction Fuzzy Hash: 1671D131400245DFCF21AF65C988AEA7BB5FF4A364F184269ED956A16AC731C881DFB0
                    APIs
                    • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E135E4
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • LoadStringW.USER32(00E72390,?,00000FFF,?), ref: 00E1360A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LoadString$_wcslen
                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                    • API String ID: 4099089115-2391861430
                    • Opcode ID: 0913fb7be32cf27b740005774b7abe257ba18d4887f5d95866db7450abe48bbf
                    • Instruction ID: 7915f589e115829c6f4b21b709acd837178aa7be736265f4c60f550b3fd89436
                    • Opcode Fuzzy Hash: 0913fb7be32cf27b740005774b7abe257ba18d4887f5d95866db7450abe48bbf
                    • Instruction Fuzzy Hash: C4518AB2800219BADF15EBA0DC52EEEBB79EF05340F145165F115721A2EB306AD9DFB0
                    APIs
                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E32E1C
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00E32E4F
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00E32E84
                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00E32EB6
                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00E32EE0
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00E32EF1
                    • SetWindowLongW.USER32 ref: 00E32F0B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LongWindow$MessageSend
                    • String ID: Hiy
                    • API String ID: 2178440468-472783900
                    • Opcode ID: b46a722781154c4b8745fdf7825f7d36322940c19bdb8877edd057b954956666
                    • Instruction ID: 30381024d6379854b9e2bb0e504514c500ff6fcea494283ebdbbedc80b65d1db
                    • Opcode Fuzzy Hash: b46a722781154c4b8745fdf7825f7d36322940c19bdb8877edd057b954956666
                    • Instruction Fuzzy Hash: 673128316042549FDB22CF1ADC8AF653BE0FB8AB14F1511A8FA44AF2B1CB71E844DB41
                    APIs
                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E1C272
                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E1C29A
                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E1C2CA
                    • GetLastError.KERNEL32 ref: 00E1C322
                    • SetEvent.KERNEL32(?), ref: 00E1C336
                    • InternetCloseHandle.WININET(00000000), ref: 00E1C341
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                    • String ID:
                    • API String ID: 3113390036-3916222277
                    • Opcode ID: be1509ffdd521b4dc5c193deb212e7effc0a99b5cab733efc3fb0ea1f40d22f9
                    • Instruction ID: 73c7ad24ec28094730f19a700288fd25185867e0d46e7a6eedd50bae4a77e051
                    • Opcode Fuzzy Hash: be1509ffdd521b4dc5c193deb212e7effc0a99b5cab733efc3fb0ea1f40d22f9
                    • Instruction Fuzzy Hash: 263180B1640608AFD7219F65CC88AEB7BFCEB49744F20951EF456F2210DB30DD899B61
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DE3AAF,?,?,Bad directive syntax error,00E3CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00E098BC
                    • LoadStringW.USER32(00000000,?,00DE3AAF,?), ref: 00E098C3
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • MessageBoxW.USER32 ref: 00E09987
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: HandleLoadMessageModuleString_wcslen
                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                    • API String ID: 858772685-4153970271
                    • Opcode ID: 87ed8ddcbe3c5a9ee2b0b541afe81fa66ce20e3953d28aec9a147051251f9c97
                    • Instruction ID: cc47ce6f85bf3d1b0a0bef9f924dfa0b175a83870eecfa0ecc775f952e7fc6b8
                    • Opcode Fuzzy Hash: 87ed8ddcbe3c5a9ee2b0b541afe81fa66ce20e3953d28aec9a147051251f9c97
                    • Instruction Fuzzy Hash: 28218D3284021EABCF11AF90CC0AEEE7B75FF19344F045469F515720A2EB719A68DB70
                    APIs
                    • GetParent.USER32 ref: 00E020AB
                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00E020C0
                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00E0214D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ClassMessageNameParentSend
                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                    • API String ID: 1290815626-3381328864
                    • Opcode ID: 270b455686ae7a9b61852cf20a48ab65c7ca78f9390b0d2a69f7042b98e2a279
                    • Instruction ID: 6c311b9f46fe69ebbcdc4b425371c434baf92420abff1b0d1f085019d410a1c6
                    • Opcode Fuzzy Hash: 270b455686ae7a9b61852cf20a48ab65c7ca78f9390b0d2a69f7042b98e2a279
                    • Instruction Fuzzy Hash: A31106776C8707B9FA152620EC0FDE677DCCB15768F20211EFB04F50D1EA61A8865624
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                    • String ID:
                    • API String ID: 1282221369-0
                    • Opcode ID: 6cad5110e1ae2065ec5718e2bbdde119a4a430b63f6fe67d1659b15a379274d3
                    • Instruction ID: ddbbebcb80e076b610a397e633c75eb3f2f9e66f86489ac2fdc51b5f983ef0be
                    • Opcode Fuzzy Hash: 6cad5110e1ae2065ec5718e2bbdde119a4a430b63f6fe67d1659b15a379274d3
                    • Instruction Fuzzy Hash: F46103B1905302AFDF21AFB49C85AB97BAAEF45320F08416FF944A7381E7319945D7B0
                    APIs
                    • LoadImageW.USER32 ref: 00DF6890
                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00DF68A9
                    • LoadImageW.USER32 ref: 00DF68B9
                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00DF68D1
                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00DF68F2
                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00DF6901
                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00DF691E
                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00DF692D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                    • String ID:
                    • API String ID: 1268354404-0
                    • Opcode ID: 9b76a02e32e5a3ac678312a63ea19fd4533a319099340fad426f3372e2ccacb8
                    • Instruction ID: d575935d8979c396b075438c4ca4f161a62101ae793cc4d6d4d9ae6b81479167
                    • Opcode Fuzzy Hash: 9b76a02e32e5a3ac678312a63ea19fd4533a319099340fad426f3372e2ccacb8
                    • Instruction Fuzzy Hash: B1516C70600209EFDB20CF25CC55FAA7BB9FB58750F148518FA56A72A0DB70E991EB60
                    APIs
                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E1C182
                    • GetLastError.KERNEL32 ref: 00E1C195
                    • SetEvent.KERNEL32(?), ref: 00E1C1A9
                      • Part of subcall function 00E1C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E1C272
                      • Part of subcall function 00E1C253: GetLastError.KERNEL32 ref: 00E1C322
                      • Part of subcall function 00E1C253: SetEvent.KERNEL32(?), ref: 00E1C336
                      • Part of subcall function 00E1C253: InternetCloseHandle.WININET(00000000), ref: 00E1C341
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                    • String ID:
                    • API String ID: 337547030-0
                    • Opcode ID: aaac44cb059337eeadb34e89e9327836ab8c3d1750cac7d98f76c6068f5e44aa
                    • Instruction ID: 1c7c7e9f9076e6c3a08355bba1f72d166f5a9b7ad247ad9efe979ab39dd4b845
                    • Opcode Fuzzy Hash: aaac44cb059337eeadb34e89e9327836ab8c3d1750cac7d98f76c6068f5e44aa
                    • Instruction Fuzzy Hash: 7F317E71280A05AFDB219FA5DC48AEABBF9FF18304B20541EF956E2620D730E855DB60
                    APIs
                      • Part of subcall function 00E03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E03A57
                      • Part of subcall function 00E03A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00E025B3), ref: 00E03A5E
                      • Part of subcall function 00E03A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00E03A65
                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E025BD
                    • PostMessageW.USER32 ref: 00E025DB
                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00E025DF
                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E025E9
                    • PostMessageW.USER32 ref: 00E02601
                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00E02605
                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E0260F
                    • PostMessageW.USER32 ref: 00E02623
                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00E02627
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                    • String ID:
                    • API String ID: 2014098862-0
                    • Opcode ID: 19205597a83e9651ada4dba760264875393a0aebc8bfe8ac3c8080fadc779f8e
                    • Instruction ID: 2040544ab63da1d0a188cc1b5c8de51c22c6a4331df707ae6ec98ce1f7470edf
                    • Opcode Fuzzy Hash: 19205597a83e9651ada4dba760264875393a0aebc8bfe8ac3c8080fadc779f8e
                    • Instruction Fuzzy Hash: 0701D431390214BBFB1067699C8EF597FA9DB4EB12F201005F318BE0D1C9E264889A6A
                    APIs
                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00E01449,?,?,00000000), ref: 00E0180C
                    • HeapAlloc.KERNEL32(00000000,?,00E01449,?,?,00000000), ref: 00E01813
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E01449,?,?,00000000), ref: 00E01828
                    • GetCurrentProcess.KERNEL32(?,00000000,?,00E01449,?,?,00000000), ref: 00E01830
                    • DuplicateHandle.KERNEL32 ref: 00E01833
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E01449,?,?,00000000), ref: 00E01843
                    • GetCurrentProcess.KERNEL32(00E01449,00000000,?,00E01449,?,?,00000000), ref: 00E0184B
                    • DuplicateHandle.KERNEL32 ref: 00E0184E
                    • CreateThread.KERNEL32(00000000,00000000,00E01874,00000000,00000000,00000000), ref: 00E01868
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                    • String ID:
                    • API String ID: 1957940570-0
                    • Opcode ID: 4c85986f7be295eb9c9139289a6acdeea317e4a44b0fba010b90605749ec2c1a
                    • Instruction ID: 9a8169e49de7c3ae770dcc15399e46112575489a15a306e845ebe381fe7b828d
                    • Opcode Fuzzy Hash: 4c85986f7be295eb9c9139289a6acdeea317e4a44b0fba010b90605749ec2c1a
                    • Instruction Fuzzy Hash: 7501BF75241308BFE710AB65DC4DF573F6CEB89B11F114451FA05EB192C671D814DB20
                    APIs
                      • Part of subcall function 00E0D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00E0D501
                      • Part of subcall function 00E0D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00E0D50F
                      • Part of subcall function 00E0D4DC: CloseHandle.KERNEL32(00000000), ref: 00E0D5DC
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E2A16D
                    • GetLastError.KERNEL32 ref: 00E2A180
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E2A1B3
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E2A268
                    • GetLastError.KERNEL32(00000000), ref: 00E2A273
                    • CloseHandle.KERNEL32(00000000), ref: 00E2A2C4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                    • String ID: SeDebugPrivilege
                    • API String ID: 2533919879-2896544425
                    • Opcode ID: 62ec9fdb7d67b5f8d29ec665f302d25b54368c09160fa5d98ea638fdf74e0d45
                    • Instruction ID: 29492d912e6a66de79d85e4161df3ef2420968d60fe63317cf1474883a3ddf50
                    • Opcode Fuzzy Hash: 62ec9fdb7d67b5f8d29ec665f302d25b54368c09160fa5d98ea638fdf74e0d45
                    • Instruction Fuzzy Hash: AB61D071205212DFD720DF14D894F15BBE1AF44318F18849CE466AB7A3C772EC49CBA2
                    APIs
                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E33925
                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00E3393A
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E33954
                    • _wcslen.LIBCMT ref: 00E33999
                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E339C6
                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E339F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$Window_wcslen
                    • String ID: SysListView32
                    • API String ID: 2147712094-78025650
                    • Opcode ID: 8eb2cdb70792f95b41c9c678ec6cfa4c81d2ac2c30b83ce332fef45751cc07db
                    • Instruction ID: bb19e9ae49a41c8656e466627e61f461f287fcc72ca64dca7590d66034ba746b
                    • Opcode Fuzzy Hash: 8eb2cdb70792f95b41c9c678ec6cfa4c81d2ac2c30b83ce332fef45751cc07db
                    • Instruction Fuzzy Hash: 1341B171A00319ABEB219F64CC49FEA7BA9EF48354F10152AF948F7281D771DE84CB90
                    APIs
                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00E3824C
                    • EnableWindow.USER32(00000000,00000000), ref: 00E38272
                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00E382D1
                    • ShowWindow.USER32(00000000,00000004), ref: 00E382E5
                    • EnableWindow.USER32(00000000,00000001), ref: 00E3830B
                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00E3832F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Show$Enable$MessageSend
                    • String ID: Hiy
                    • API String ID: 642888154-472783900
                    • Opcode ID: 59414346d7df28698929fae208f78c35a8601014e56df6c35f7665aacaaecfda
                    • Instruction ID: 9af33d0f6c4e4e8f83b52efe8afec91442cb1da870cacb45184d89240cb33dae
                    • Opcode Fuzzy Hash: 59414346d7df28698929fae208f78c35a8601014e56df6c35f7665aacaaecfda
                    • Instruction Fuzzy Hash: 5541A430601744EFDB11CF19C99DBA57FE0BB45718F1861A9FA487B272CB32A845CB51
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: IconLoad
                    • String ID: blank$info$question$stop$warning
                    • API String ID: 2457776203-404129466
                    • Opcode ID: cbd5fd70dec44252c62d9f35cbca2d9e04de67547f078a375e78eec4b2a2682b
                    • Instruction ID: 9dd619e55e4f9c4e2694eecff65faad87d464c875e212d375364f64452a7d9d5
                    • Opcode Fuzzy Hash: cbd5fd70dec44252c62d9f35cbca2d9e04de67547f078a375e78eec4b2a2682b
                    • Instruction Fuzzy Hash: 2A112B316C9307BAE7055B14EC82DEA679CDF15358B70512FF904F61C2D770AD815278
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$LocalTime
                    • String ID:
                    • API String ID: 952045576-0
                    • Opcode ID: 2d65f06bcd062df0d06e841249ac88c157e287011af5570a97024857bdc1fd2e
                    • Instruction ID: aae215a9d7a9ceeca8899a14fcfbe181d862a4b54522a85598fcd2a509920f8a
                    • Opcode Fuzzy Hash: 2d65f06bcd062df0d06e841249ac88c157e287011af5570a97024857bdc1fd2e
                    • Instruction Fuzzy Hash: 01418E65C1021965CB11EBF4CC8AECFB7A8EF45310F50886AE518F3261EB34E245C7B9
                    APIs
                    • ShowWindow.USER32(FFFFFFFF,000000FF), ref: 00DBF953
                    • ShowWindow.USER32(FFFFFFFF,00000006), ref: 00DFF3D1
                    • ShowWindow.USER32(FFFFFFFF,000000FF), ref: 00DFF454
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ShowWindow
                    • String ID:
                    • API String ID: 1268545403-0
                    • Opcode ID: ef82c5d72437a36f79a19ff350f07854f6425f1c030476fcdcf132b60cee615a
                    • Instruction ID: c058b4d714f19a033243a17e2d80f1d662fbbb20968227ee5cbb4f380600cbbf
                    • Opcode Fuzzy Hash: ef82c5d72437a36f79a19ff350f07854f6425f1c030476fcdcf132b60cee615a
                    • Instruction Fuzzy Hash: 4741F431608784FECF398B298C887BE7B92AF56314F19843DE58762560C672E884DF31
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 00E32D1B
                    • GetDC.USER32(00000000), ref: 00E32D23
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E32D2E
                    • ReleaseDC.USER32(00000000,00000000), ref: 00E32D3A
                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E32D76
                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E32D87
                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00E32DC2
                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E32DE1
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                    • String ID:
                    • API String ID: 3864802216-0
                    • Opcode ID: 7310027319ed20b009089f2a57e6ffd4229bb31d1ccf621e69f7c67c70c8a7c0
                    • Instruction ID: ac7ad831d62f4dd1c8c8d3686d5d0c2d0f63d74ec2152845ab436ef373a3922f
                    • Opcode Fuzzy Hash: 7310027319ed20b009089f2a57e6ffd4229bb31d1ccf621e69f7c67c70c8a7c0
                    • Instruction Fuzzy Hash: 33319C72201214BFEB218F51CC8AFEB3FA9EF49715F144055FE48BA291C6759C41CBA1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: ae5836e34969c02f83db924d1f5c3521ff97eb9ab079dfbeff5af3ff1bd23b60
                    • Instruction ID: 4feda979d296e9feb9c2d35ed657eb41afde6cb125e77c0ee1b212e3b80f2851
                    • Opcode Fuzzy Hash: ae5836e34969c02f83db924d1f5c3521ff97eb9ab079dfbeff5af3ff1bd23b60
                    • Instruction Fuzzy Hash: 0721C867A40B1AB7D2145510AE92FFB635CEE22388F442025FD047B5C2F722ED51CDB5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: NULL Pointer assignment$Not an Object type
                    • API String ID: 0-572801152
                    • Opcode ID: 43306b52b0f1eb7389504db6a9a21ab33b2299506b95127e0dc835c300632970
                    • Instruction ID: 636f3c420d9395645a40bad0e6ce2e94939a0b00f9513671fb90614ca252c294
                    • Opcode Fuzzy Hash: 43306b52b0f1eb7389504db6a9a21ab33b2299506b95127e0dc835c300632970
                    • Instruction Fuzzy Hash: 28D1A072A0061A9FDF10CF98E984FAEB7B5BF48348F149069E915BB281D770DD45CBA0
                    APIs
                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00DE15CE
                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE1651
                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00DE17FB,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE16E4
                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE16FB
                      • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE1777
                    • __freea.LIBCMT ref: 00DE17A2
                    • __freea.LIBCMT ref: 00DE17AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                    • String ID:
                    • API String ID: 2829977744-0
                    • Opcode ID: acf247e6bc501dbd3f3d2596ce470c6c399b68365dc77487252b3117ad1472e5
                    • Instruction ID: 598b084f83059b2b8f43b6ea98720d2c72f8b463ca1f8c96fb511943299b62da
                    • Opcode Fuzzy Hash: acf247e6bc501dbd3f3d2596ce470c6c399b68365dc77487252b3117ad1472e5
                    • Instruction Fuzzy Hash: EF91B17AF002969ADB20AF66C881EEE7BB5EF49710F184659E846E7281D735CC44CB70
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$ClearInit
                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                    • API String ID: 2610073882-625585964
                    • Opcode ID: 5828ceb430eb7dbb4761d7d754a61ca74f8677906ef5a65e037f0d186502ae57
                    • Instruction ID: 50c2403e4c78ace8eebe662f755d89ad1fbaefae3e8e9869629c2480c3af35c8
                    • Opcode Fuzzy Hash: 5828ceb430eb7dbb4761d7d754a61ca74f8677906ef5a65e037f0d186502ae57
                    • Instruction Fuzzy Hash: 199193B1A00229AFDF24CFA5D844FAEBBB8EF46714F10955AF515BB280D7709941CFA0
                    APIs
                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00E1125C
                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00E11284
                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00E112A8
                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E112D8
                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E1135F
                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E113C4
                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E11430
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                    • String ID:
                    • API String ID: 2550207440-0
                    • Opcode ID: d76d83141ce5882f5484f57deb1a1022369e33fa887d8f2551b924484366b123
                    • Instruction ID: f1c27b9fabeb18dbed1343841873474fcc27db779dbcf8e5b70ac51da2ee4942
                    • Opcode Fuzzy Hash: d76d83141ce5882f5484f57deb1a1022369e33fa887d8f2551b924484366b123
                    • Instruction Fuzzy Hash: DA91EF71A00219AFDB00DFA4D884BFEB7B5FF45714F1050A9EA51FB2A1D774A981CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ObjectSelect$BeginCreatePath
                    • String ID:
                    • API String ID: 3225163088-0
                    • Opcode ID: 749de3e54cf2f644800d5276b06c3b7c29d8d52838163cbe2fc538b36084fb8c
                    • Instruction ID: 69232fc820396bb5e217f0bffa2bb310c842f996dc9dcab33515bdec32a7a502
                    • Opcode Fuzzy Hash: 749de3e54cf2f644800d5276b06c3b7c29d8d52838163cbe2fc538b36084fb8c
                    • Instruction Fuzzy Hash: 25911571940259EFCB14CFA9CC88AEEBBB8FF49320F148055E616B7251D674AA42CB70
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00E2396B
                    • CharUpperBuffW.USER32(?,?), ref: 00E23A7A
                    • _wcslen.LIBCMT ref: 00E23A8A
                    • VariantClear.OLEAUT32(?), ref: 00E23C1F
                      • Part of subcall function 00E10CDF: VariantInit.OLEAUT32(00000000), ref: 00E10D1F
                      • Part of subcall function 00E10CDF: VariantCopy.OLEAUT32(?,?), ref: 00E10D28
                      • Part of subcall function 00E10CDF: VariantClear.OLEAUT32(?), ref: 00E10D34
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                    • API String ID: 4137639002-1221869570
                    • Opcode ID: 7f20a77429e41482b0b1fbd4bad6468622bc54c3b2b1f5bfb90cec301e9fb896
                    • Instruction ID: 7f85977e36b4f04f5f3d3d0c5ab97213835049011ed155d439ab648d6cf5e80e
                    • Opcode Fuzzy Hash: 7f20a77429e41482b0b1fbd4bad6468622bc54c3b2b1f5bfb90cec301e9fb896
                    • Instruction Fuzzy Hash: A19133746083159FC704EF24D48196AB7E5FB89314F14882EF88AA7351DB35EE45CFA2
                    APIs
                      • Part of subcall function 00E0000E: CLSIDFromProgID.OLE32 ref: 00E0002B
                      • Part of subcall function 00E0000E: ProgIDFromCLSID.OLE32(?,00000000), ref: 00E00046
                      • Part of subcall function 00E0000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?), ref: 00E00054
                      • Part of subcall function 00E0000E: CoTaskMemFree.OLE32(00000000), ref: 00E00064
                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00E24C51
                    • _wcslen.LIBCMT ref: 00E24D59
                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00E24DCF
                    • CoTaskMemFree.OLE32(?), ref: 00E24DDA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                    • String ID: NULL Pointer assignment
                    • API String ID: 614568839-2785691316
                    • Opcode ID: 9e520f6fbdff6ae4d7b0b35d7361fdac104b65fd50e21287c1530a5b63cd6982
                    • Instruction ID: a4c71d60f98908684210f4ab28eeed26ab6b0910e35a5d11757c6451c7bebbcd
                    • Opcode Fuzzy Hash: 9e520f6fbdff6ae4d7b0b35d7361fdac104b65fd50e21287c1530a5b63cd6982
                    • Instruction Fuzzy Hash: DB91E5B1D002299FDB14DFA4D891AEEBBB9FB08314F108569E915BB291DB349A44CF60
                    APIs
                    • GetMenu.USER32 ref: 00E32183
                    • GetMenuItemCount.USER32(00000000), ref: 00E321B5
                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E321DD
                    • _wcslen.LIBCMT ref: 00E32213
                    • GetMenuItemID.USER32(?,?), ref: 00E3224D
                    • GetSubMenu.USER32 ref: 00E3225B
                      • Part of subcall function 00E03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E03A57
                      • Part of subcall function 00E03A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00E025B3), ref: 00E03A5E
                      • Part of subcall function 00E03A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00E03A65
                    • PostMessageW.USER32 ref: 00E322E3
                      • Part of subcall function 00E0E97B: Sleep.KERNEL32 ref: 00E0E9F3
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                    • String ID:
                    • API String ID: 4196846111-0
                    • Opcode ID: 780fcc3c6e0e6387dfe05fc96fb73b9021752603ce55002af8450de5dc0e065d
                    • Instruction ID: 4347fb6f5bf2bc984ad8bff65135d4f57d0a37dfe8bb285547a755eed7fd40d4
                    • Opcode Fuzzy Hash: 780fcc3c6e0e6387dfe05fc96fb73b9021752603ce55002af8450de5dc0e065d
                    • Instruction Fuzzy Hash: E3718D35A00205AFCB10DF64C849AAEBBF5EF89324F14945DE956BB351DB34ED41CBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: 07cafe238257e8c0aaf63d114a4f676d1351777ff2e51c36f53d1c7cd326ea27
                    • Instruction ID: e1673238bf17e43629c9845d5472e2a1b2a6f4ca056641ed887b801bf63ba494
                    • Opcode Fuzzy Hash: 07cafe238257e8c0aaf63d114a4f676d1351777ff2e51c36f53d1c7cd326ea27
                    • Instruction Fuzzy Hash: 4851B2A06047DA7DFB368334C845BBABEE96B06308F0C9599E1D9A54D2C398A8C8D751
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: a0ae601916703be5edef6c76788e8a02c6c7899c96f5dabc59ffdf02dfae4712
                    • Instruction ID: d063caeae5b9fcdabdceb14da3ea569708cfd3cb28aa7a43b6aa80bf6f480537
                    • Opcode Fuzzy Hash: a0ae601916703be5edef6c76788e8a02c6c7899c96f5dabc59ffdf02dfae4712
                    • Instruction Fuzzy Hash: D351E3A15047D93DFB328334CC55BBABEE86B46308F0C9499E1D5668C2D294ECC9D762
                    APIs
                    • GetConsoleCP.KERNEL32 ref: 00DD5470
                    • __fassign.LIBCMT ref: 00DD54EB
                    • __fassign.LIBCMT ref: 00DD5506
                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00DE3CD6,00000005,00000000,00000000), ref: 00DD552C
                    • WriteFile.KERNEL32(?,00DE3CD6,00000000,00DD5BA3,00000000), ref: 00DD554B
                    • WriteFile.KERNEL32(?,?,00000001,00DD5BA3,00000000), ref: 00DD5584
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                    • String ID:
                    • API String ID: 1324828854-0
                    • Opcode ID: b7d8db60c340c08e8eb165e9e1e5dfc2577573e5afef702e51c3041ba3f36b8b
                    • Instruction ID: 4a6fd77b6d6a6b18b4e3f670252b9d1bf0984b79ab2d24263efac108ba5de3b0
                    • Opcode Fuzzy Hash: b7d8db60c340c08e8eb165e9e1e5dfc2577573e5afef702e51c3041ba3f36b8b
                    • Instruction Fuzzy Hash: 7651AE70A00649AFDB11CFA8EC45AEEBBF9EF09300F14415AE555E7395D630DA81CB60
                    APIs
                    • SetWindowLongW.USER32 ref: 00E36C33
                    • SetWindowLongW.USER32 ref: 00E36C4A
                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00E36C73
                    • ShowWindow.USER32(00000002,00000000), ref: 00E36C98
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027), ref: 00E36CC7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Long$MessageSendShow
                    • String ID: Hiy
                    • API String ID: 3688381893-472783900
                    • Opcode ID: 6c1646144765ea4d1cd2e62e328cc9d8220f38cd7bac207560051bf354809e9f
                    • Instruction ID: 19710e0d5a2687365560016d9c95e1c15417ec056c1bac4289d8c80ee56c421b
                    • Opcode Fuzzy Hash: 6c1646144765ea4d1cd2e62e328cc9d8220f38cd7bac207560051bf354809e9f
                    • Instruction Fuzzy Hash: 9141AF35A04104BFDB24CF39CC5DFA9BFA5EB49354F14A268E999B72A0C371ED41CA50
                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 00DC2D4B
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00DC2D53
                    • _ValidateLocalCookies.LIBCMT ref: 00DC2DE1
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00DC2E0C
                    • _ValidateLocalCookies.LIBCMT ref: 00DC2E61
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                    • String ID: csm
                    • API String ID: 1170836740-1018135373
                    • Opcode ID: a7445edbf51ce3c6d2dbcd95f80d5f60b28baf17950d482fb67c520bb424c66a
                    • Instruction ID: 778b62b473353002f5eb839eda02c4147b1226dc5b9ace40435a2ec5a37f627b
                    • Opcode Fuzzy Hash: a7445edbf51ce3c6d2dbcd95f80d5f60b28baf17950d482fb67c520bb424c66a
                    • Instruction Fuzzy Hash: 28418134A0020AABCF10DF68C845FAEBBA5FF55324F188159F9156B252DB31EA05CBF1
                    APIs
                      • Part of subcall function 00E2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E2307A
                      • Part of subcall function 00E2304E: _wcslen.LIBCMT ref: 00E2309B
                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E21112
                    • WSAGetLastError.WSOCK32 ref: 00E21121
                    • WSAGetLastError.WSOCK32 ref: 00E211C9
                    • closesocket.WSOCK32(00000000), ref: 00E211F9
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                    • String ID:
                    • API String ID: 2675159561-0
                    • Opcode ID: dbca00127d6a34a2fb841c096f40a62c0c5bcf1e711ff291d654aa381fe98e20
                    • Instruction ID: 52f669e3c085d3d66f8671a6c0333e4e57e2106a5fe5a72ca8badd0fa9c2fcb8
                    • Opcode Fuzzy Hash: dbca00127d6a34a2fb841c096f40a62c0c5bcf1e711ff291d654aa381fe98e20
                    • Instruction Fuzzy Hash: 6C411831601228AFDB109F24D844BA9BBE9FF85328F148099FD05BB291C770EE45CBE1
                    APIs
                      • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E0CF22,?), ref: 00E0DDFD
                      • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E0CF22,?), ref: 00E0DE16
                    • lstrcmpiW.KERNEL32(?,?), ref: 00E0CF45
                    • MoveFileW.KERNEL32 ref: 00E0CF7F
                    • _wcslen.LIBCMT ref: 00E0D005
                    • _wcslen.LIBCMT ref: 00E0D01B
                    • SHFileOperationW.SHELL32(?), ref: 00E0D061
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                    • String ID: \*.*
                    • API String ID: 3164238972-1173974218
                    • Opcode ID: a6bc33121154574e1e45a2b56559b4693feac309982d1cda25456ccbc2eb13ea
                    • Instruction ID: f031cc98aa5e99ba9a4c7288b11c2e35c4d1dd625c87968f80e4485c4b51c5df
                    • Opcode Fuzzy Hash: a6bc33121154574e1e45a2b56559b4693feac309982d1cda25456ccbc2eb13ea
                    • Instruction Fuzzy Hash: BC4158B19452195FDF12EBA4DD81EDEB7F9EF04380F1010E6E505FB181EA34A688CB61
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E07769
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E0778F
                    • SysAllocString.OLEAUT32(00000000), ref: 00E07792
                    • SysAllocString.OLEAUT32(?), ref: 00E077B0
                    • SysFreeString.OLEAUT32(?), ref: 00E077B9
                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00E077DE
                    • SysAllocString.OLEAUT32(?), ref: 00E077EC
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                    • String ID:
                    • API String ID: 3761583154-0
                    • Opcode ID: c33349f80164051d3d6d1d75ff2eecfc3857d83aad639d9f6d568397d053f20b
                    • Instruction ID: 4bb567fc0e5cec630d7fe5c8cd8be34ab4c9087d5ec0afa93fb722d1f9670b38
                    • Opcode Fuzzy Hash: c33349f80164051d3d6d1d75ff2eecfc3857d83aad639d9f6d568397d053f20b
                    • Instruction Fuzzy Hash: 6221A176A04219AFDB10DFA9CC88CBB77ACEB093A47148026BA55FB190D670EC85C760
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E07842
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E07868
                    • SysAllocString.OLEAUT32(00000000), ref: 00E0786B
                    • SysAllocString.OLEAUT32 ref: 00E0788C
                    • SysFreeString.OLEAUT32 ref: 00E07895
                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00E078AF
                    • SysAllocString.OLEAUT32(?), ref: 00E078BD
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                    • String ID:
                    • API String ID: 3761583154-0
                    • Opcode ID: 0e98f229a3443f9518b62ceb74f70b277e7a5743759f296b8a4e4accc7e8c63a
                    • Instruction ID: b288ee382fdfd823d059b5578e8634318ee0365ebfe01f899b2ca2b69d8ef282
                    • Opcode Fuzzy Hash: 0e98f229a3443f9518b62ceb74f70b277e7a5743759f296b8a4e4accc7e8c63a
                    • Instruction Fuzzy Hash: 75219232A04218AFDB149FA9DC8CDBA77ACEB083647108125F955EB2A1D670EC85CB74
                    APIs
                    • GetStdHandle.KERNEL32(0000000C), ref: 00E104F2
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E1052E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateHandlePipe
                    • String ID: nul
                    • API String ID: 1424370930-2873401336
                    • Opcode ID: 3daeaaff547eb69c9ab893a29c3aae6515085118ed3c748fba0199a98fbcd399
                    • Instruction ID: 4aaf4687e1a627723f5fa9157a6c3d59741fef9767d0496622c792699c59ff40
                    • Opcode Fuzzy Hash: 3daeaaff547eb69c9ab893a29c3aae6515085118ed3c748fba0199a98fbcd399
                    • Instruction Fuzzy Hash: 1C212C75500309AFDB309F69D848ADA7BF5AF44768F205A19E8A1F62E0D7B0D9D4CF20
                    APIs
                    • GetStdHandle.KERNEL32(000000F6), ref: 00E105C6
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E10601
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateHandlePipe
                    • String ID: nul
                    • API String ID: 1424370930-2873401336
                    • Opcode ID: 0adcceb5a0e3f783f22e2dac33e59c3189a848958f7ca74da6f1833d5958a5d7
                    • Instruction ID: 1301f7935bfdcc9f99133dab5ff750b27307313ede89e4be73ef2ddb311d1ef2
                    • Opcode Fuzzy Hash: 0adcceb5a0e3f783f22e2dac33e59c3189a848958f7ca74da6f1833d5958a5d7
                    • Instruction Fuzzy Hash: C92151755003059FDB209F699C48ADAB7E4AF95724F205A19F8B1F72E0D7F099E0CB60
                    APIs
                      • Part of subcall function 00DA600E: CreateWindowExW.USER32 ref: 00DA604C
                      • Part of subcall function 00DA600E: GetStockObject.GDI32(00000011), ref: 00DA6060
                      • Part of subcall function 00DA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA606A
                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E34112
                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E3411F
                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E3412A
                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E34139
                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E34145
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$CreateObjectStockWindow
                    • String ID: Msctls_Progress32
                    • API String ID: 1025951953-3636473452
                    • Opcode ID: c42877c025522b7dbbe392b988444fb32998f9670cfa49faee5142186284917b
                    • Instruction ID: 8b47d2cee95e71f6f0afaadcd873ff39a640bc33afef538fdb849d5aff33e178
                    • Opcode Fuzzy Hash: c42877c025522b7dbbe392b988444fb32998f9670cfa49faee5142186284917b
                    • Instruction Fuzzy Hash: 881190B2140219BEEF118E64CC86EE77FADEF08798F015111FA18B2090CA72DC61DBA4
                    APIs
                    • GetSysColor.USER32 ref: 00DB98CC
                    • SetTextColor.GDI32(?,?), ref: 00DB98D6
                    • SetBkMode.GDI32(?,00000001), ref: 00DB98E9
                    • GetStockObject.GDI32(00000005), ref: 00DB98F1
                    • GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Color$LongModeObjectStockTextWindow
                    • String ID: Hiy
                    • API String ID: 1860813098-472783900
                    • Opcode ID: 2e0c7a6b6969886a85e362d0ca5bc2acaa7d1e540300a7f144dc4d75702e55e4
                    • Instruction ID: 3589d21d6caaf3b8633ed58cd7603bfd0296ff3491012b45b5e6073b8c8e754f
                    • Opcode Fuzzy Hash: 2e0c7a6b6969886a85e362d0ca5bc2acaa7d1e540300a7f144dc4d75702e55e4
                    • Instruction Fuzzy Hash: BF21F33254A2D4DFCB228B369C69AE67F609B13320B2C015EE797AB1A1C7258941CB61
                    APIs
                      • Part of subcall function 00DDD7A3: _free.LIBCMT ref: 00DDD7CC
                    • _free.LIBCMT ref: 00DDD82D
                      • Part of subcall function 00DD29C8: HeapFree.KERNEL32(00000000,00000000), ref: 00DD29DE
                      • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                    • _free.LIBCMT ref: 00DDD838
                    • _free.LIBCMT ref: 00DDD843
                    • _free.LIBCMT ref: 00DDD897
                    • _free.LIBCMT ref: 00DDD8A2
                    • _free.LIBCMT ref: 00DDD8AD
                    • _free.LIBCMT ref: 00DDD8B8
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                    • Instruction ID: 34a6ddbd800b5b5fb21c6e7e8ef0f9a65db9229ca9f0862d04dfa91f9c318e9d
                    • Opcode Fuzzy Hash: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                    • Instruction Fuzzy Hash: FD112971580B04BADA31BFB0CC46FDB7B9DEF10700F400826B29EA6292DB75A5059A70
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E0DA74
                    • LoadStringW.USER32(00000000), ref: 00E0DA7B
                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E0DA91
                    • LoadStringW.USER32(00000000), ref: 00E0DA98
                    • MessageBoxW.USER32 ref: 00E0DADC
                    Strings
                    • %s (%d) : ==> %s: %s %s, xrefs: 00E0DAB9
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString$Message
                    • String ID: %s (%d) : ==> %s: %s %s
                    • API String ID: 4072794657-3128320259
                    • Opcode ID: 836b4c79c6b6522373f6ef8cfaee8bebe5efb830618a85352ba41db2224f720f
                    • Instruction ID: 2f6b50a392f14208ea47b297e9ab47da16c500a168333c1a70a53aa9d7537eb8
                    • Opcode Fuzzy Hash: 836b4c79c6b6522373f6ef8cfaee8bebe5efb830618a85352ba41db2224f720f
                    • Instruction Fuzzy Hash: 90014FF25002087FE7109BA19D8DEE6766CE708701F501496B746F2081EA74DE888F74
                    APIs
                    • InterlockedExchange.KERNEL32(0078A260,0078A260), ref: 00E1097B
                    • EnterCriticalSection.KERNEL32(0078A240,00000000), ref: 00E1098D
                    • TerminateThread.KERNEL32(00000000,000001F6), ref: 00E1099B
                    • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00E109A9
                    • CloseHandle.KERNEL32(00000000), ref: 00E109B8
                    • InterlockedExchange.KERNEL32(0078A260,000001F6), ref: 00E109C8
                    • LeaveCriticalSection.KERNEL32(0078A240), ref: 00E109CF
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                    • String ID:
                    • API String ID: 3495660284-0
                    • Opcode ID: 8041ec63efdf05dd96a93aea411438c5f5ea28115bf1b3755e987f33a054c5d4
                    • Instruction ID: 1f4bffd487e5bbc5fa145bfa47e1850a17bd0de82ec440cb42d3f90b08a8c5e7
                    • Opcode Fuzzy Hash: 8041ec63efdf05dd96a93aea411438c5f5ea28115bf1b3755e987f33a054c5d4
                    • Instruction Fuzzy Hash: 0EF01D31442906AFD7415B95EE8CAD67A35BF45702F502015F101708B1C7B5D4B9CF90
                    APIs
                    • __allrem.LIBCMT ref: 00DD00BA
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD00D6
                    • __allrem.LIBCMT ref: 00DD00ED
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD010B
                    • __allrem.LIBCMT ref: 00DD0122
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD0140
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                    • String ID:
                    • API String ID: 1992179935-0
                    • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                    • Instruction ID: d53fb87b30bf0cbf526241e26ffa89a1ce5ff171c9330a00ec1aca705a7218dc
                    • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                    • Instruction Fuzzy Hash: 7181E472A00706ABE720AB69CC41BAA77E9EF81764F28453FF551D7381E770D9048BB0
                    APIs
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                      • Part of subcall function 00E2C998: CharUpperBuffW.USER32(?,?), ref: 00E2C9B5
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2C9F1
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA68
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA9E
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2BCCA
                    • RegOpenKeyExW.ADVAPI32 ref: 00E2BD25
                    • RegCloseKey.ADVAPI32(00000000), ref: 00E2BD6A
                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E2BD99
                    • RegCloseKey.ADVAPI32(?), ref: 00E2BDF3
                    • RegCloseKey.ADVAPI32(?), ref: 00E2BDFF
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                    • String ID:
                    • API String ID: 1120388591-0
                    • Opcode ID: df5a9c81be1748f9d04ce1c1554fdaf3743318f3a0abf47e98ec4d32c70a2aee
                    • Instruction ID: ed723dd7f03a379167a9de744f1486f355cad374bc10eccf1f707368313fade3
                    • Opcode Fuzzy Hash: df5a9c81be1748f9d04ce1c1554fdaf3743318f3a0abf47e98ec4d32c70a2aee
                    • Instruction Fuzzy Hash: B781DF30208241EFC714DF24D895E6ABBE5FF85308F14895CF45A9B2A2DB31ED45CBA2
                    APIs
                    • VariantInit.OLEAUT32(00000035), ref: 00DFF7B9
                    • SysAllocString.OLEAUT32(00000001), ref: 00DFF860
                    • VariantCopy.OLEAUT32(00DFFA64,00000000), ref: 00DFF889
                    • VariantClear.OLEAUT32(00DFFA64), ref: 00DFF8AD
                    • VariantCopy.OLEAUT32(00DFFA64,00000000), ref: 00DFF8B1
                    • VariantClear.OLEAUT32(?), ref: 00DFF8BB
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$ClearCopy$AllocInitString
                    • String ID:
                    • API String ID: 3859894641-0
                    • Opcode ID: 9615cb863918c08e37c78ed28ec2377c59159d0998319bd82c82898ecbf79761
                    • Instruction ID: 2fd2fda772b99c574f0f0ece1f6a8563ed9b8f4fc448efe257e36fad62f4e594
                    • Opcode Fuzzy Hash: 9615cb863918c08e37c78ed28ec2377c59159d0998319bd82c82898ecbf79761
                    • Instruction Fuzzy Hash: 0851C636500318BACF20AB65D895B3DB3A4EF45710B25D467EA06EF292DBB0CC40DB76
                    APIs
                      • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00E194E5
                    • _wcslen.LIBCMT ref: 00E19506
                    • _wcslen.LIBCMT ref: 00E1952D
                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00E19585
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$FileName$OpenSave
                    • String ID: X
                    • API String ID: 83654149-3081909835
                    • Opcode ID: bc97b2eed28bdf5ceb4ef2c044be3e138777eef34eca06cbda8fbd5da920e38e
                    • Instruction ID: 59e74ef18d93b346b1749562848ded836db835c57ad5abc06c7d44619fe4cf2b
                    • Opcode Fuzzy Hash: bc97b2eed28bdf5ceb4ef2c044be3e138777eef34eca06cbda8fbd5da920e38e
                    • Instruction Fuzzy Hash: 0AE190315083108FC714DF24C891AAAB7E5FF85314F14996DF899AB2A2DB30DD45CBB2
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    • BeginPaint.USER32(?,?), ref: 00DB9241
                    • GetWindowRect.USER32(?,?), ref: 00DB92A5
                    • ScreenToClient.USER32(?,?), ref: 00DB92C2
                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DB92D3
                    • EndPaint.USER32(?,?), ref: 00DB9321
                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00DF71EA
                      • Part of subcall function 00DB9339: BeginPath.GDI32(00000000), ref: 00DB9357
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                    • String ID:
                    • API String ID: 3050599898-0
                    • Opcode ID: 170d3e5311c3418612c828214c6cce4e41de63e259b830e34271dd7c25030f5e
                    • Instruction ID: f22f88fc3290f027ddce217cecb83f225970c4be4f6ba7449fff8ee081a62e00
                    • Opcode Fuzzy Hash: 170d3e5311c3418612c828214c6cce4e41de63e259b830e34271dd7c25030f5e
                    • Instruction Fuzzy Hash: 7341BD30104344EFD711DF29C899FFABBB8EB86720F140269FA95A62A1C7309849DB71
                    APIs
                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E1080C
                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00E10847
                    • EnterCriticalSection.KERNEL32(?), ref: 00E10863
                    • LeaveCriticalSection.KERNEL32(?), ref: 00E108DC
                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00E108F3
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E10921
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                    • String ID:
                    • API String ID: 3368777196-0
                    • Opcode ID: fe1eaed19bcf3320711e8a5a854005c2d44ee717fd43d1ce23cfe843ae6c202a
                    • Instruction ID: 03576be695183d12f14313fb22d506063399f824948db6ceb7ab7dd9050fea1c
                    • Opcode Fuzzy Hash: fe1eaed19bcf3320711e8a5a854005c2d44ee717fd43d1ce23cfe843ae6c202a
                    • Instruction Fuzzy Hash: AC415971900205EFDF14AF65DC85AAA7BB9FF44314F1440A9E900AA296D770DEA4DBB0
                    APIs
                    • IsWindowVisible.USER32(?), ref: 00E04C95
                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E04CB2
                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E04CEA
                    • _wcslen.LIBCMT ref: 00E04D08
                    • CharUpperBuffW.USER32(00000000,00000000), ref: 00E04D10
                    • _wcsstr.LIBVCRUNTIME ref: 00E04D1A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                    • String ID:
                    • API String ID: 72514467-0
                    • Opcode ID: 1e2ab44df87c63e412dda59bcc54a8de720e2e1d88d8ddef409c2a0e391b27f4
                    • Instruction ID: 7c9ea2e6664a6d169b5983db3e7301a331e23f54cd887c644ff9e67d157e6ce3
                    • Opcode Fuzzy Hash: 1e2ab44df87c63e412dda59bcc54a8de720e2e1d88d8ddef409c2a0e391b27f4
                    • Instruction Fuzzy Hash: C621F5F1204204BBFB155B259D4AE7B7B98DF45754F10502DF905EA1D1DA71CC4086B1
                    APIs
                      • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                    • _wcslen.LIBCMT ref: 00E1587B
                    • CoInitialize.OLE32(00000000), ref: 00E15995
                    • CoCreateInstance.OLE32(00E3FCF8,00000000,00000001,00E3FB68,?), ref: 00E159AE
                    • CoUninitialize.OLE32 ref: 00E159CC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                    • String ID: .lnk
                    • API String ID: 3172280962-24824748
                    • Opcode ID: 2907829b4a90113703d09ddc3eb12561f52bba69dcfc672bbb340567e63d7714
                    • Instruction ID: 3b6d4634fb50eb93588df2274a02017ce26189aa9bd74b3083cfd8cc68ef9628
                    • Opcode Fuzzy Hash: 2907829b4a90113703d09ddc3eb12561f52bba69dcfc672bbb340567e63d7714
                    • Instruction Fuzzy Hash: 0DD15472608701DFC714DF24C480AAABBE1EFC9714F14885DF899AB261D731ED85CBA2
                    APIs
                      • Part of subcall function 00E00FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E00FCA
                      • Part of subcall function 00E00FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E00FD6
                      • Part of subcall function 00E00FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E00FE5
                      • Part of subcall function 00E00FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E00FEC
                      • Part of subcall function 00E00FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E01002
                    • GetLengthSid.ADVAPI32(?,00000000,00E01335), ref: 00E017AE
                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E017BA
                    • HeapAlloc.KERNEL32(00000000), ref: 00E017C1
                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E017DA
                    • GetProcessHeap.KERNEL32(00000000,00000000,00E01335), ref: 00E017EE
                    • HeapFree.KERNEL32(00000000), ref: 00E017F5
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                    • String ID:
                    • API String ID: 3008561057-0
                    • Opcode ID: 4d391a0bc708255c2442e97d3fba7970d03aa9b4e3d70ae0a8e664b6a1e29918
                    • Instruction ID: 18a5985db83f7f2d6d82febe0966ea8dcb265aa047d98966515cdfde992b6eac
                    • Opcode Fuzzy Hash: 4d391a0bc708255c2442e97d3fba7970d03aa9b4e3d70ae0a8e664b6a1e29918
                    • Instruction Fuzzy Hash: E411E131505209FFDB148FA4CC48BAE7BF8EB46319F244059F481BB150C732D984DB60
                    APIs
                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00E014FF
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00E01506
                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00E01515
                    • CloseHandle.KERNEL32(00000004), ref: 00E01520
                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E0154F
                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00E01563
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                    • String ID:
                    • API String ID: 1413079979-0
                    • Opcode ID: 454cc8edc22aa337cb6f3bbbee4838955df49a618ae4d0fd87f9b0caec0acae5
                    • Instruction ID: 4dc2847a077aa8d61d47ac260a9b7ca7c0d9dd069fc122962933a09dad176146
                    • Opcode Fuzzy Hash: 454cc8edc22aa337cb6f3bbbee4838955df49a618ae4d0fd87f9b0caec0acae5
                    • Instruction Fuzzy Hash: 4C11567250020DAFDF118FA8DD49BDE7BA9EF48748F154065FA05B60A0C371CEA8DB60
                    APIs
                    • GetLastError.KERNEL32(?,?,00DC3379,00DC2FE5), ref: 00DC3390
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DC339E
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DC33B7
                    • SetLastError.KERNEL32(00000000,?,00DC3379,00DC2FE5), ref: 00DC3409
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: 2b941a6b29da715abf34f30a37141c19c7a0fdaa3d48c5e691e4ed363f3cf445
                    • Instruction ID: cbda732ffc9b2abafd46c943227aa4e26a62ad46a22f28084f0da6c8a5ca91d5
                    • Opcode Fuzzy Hash: 2b941a6b29da715abf34f30a37141c19c7a0fdaa3d48c5e691e4ed363f3cf445
                    • Instruction Fuzzy Hash: 8701283220C313BEAA142775BC95F672A54DB053B9330832DF410A31F0EF518D0556B4
                    APIs
                    • GetLastError.KERNEL32(?,?,00DD5686,00DE3CD6,?,00000000,?,00DD5B6A,?,?,?,?,?,00DCE6D1,?,00E68A48), ref: 00DD2D78
                    • _free.LIBCMT ref: 00DD2DAB
                    • _free.LIBCMT ref: 00DD2DD3
                    • SetLastError.KERNEL32(00000000,?,?,?,?,00DCE6D1,?,00E68A48,00000010,00DA4F4A,?,?,00000000,00DE3CD6), ref: 00DD2DE0
                    • SetLastError.KERNEL32(00000000,?,?,?,?,00DCE6D1,?,00E68A48,00000010,00DA4F4A,?,?,00000000,00DE3CD6), ref: 00DD2DEC
                    • _abort.LIBCMT ref: 00DD2DF2
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLast$_free$_abort
                    • String ID:
                    • API String ID: 3160817290-0
                    • Opcode ID: b9322ac73e807f057eebf4d3a97370da6cdce6557ca7dd176ebe1e0460afc704
                    • Instruction ID: c13737938cfab4b9a6b1c7ad1a773962a8e50b23377f2b36bebc55da5128b94d
                    • Opcode Fuzzy Hash: b9322ac73e807f057eebf4d3a97370da6cdce6557ca7dd176ebe1e0460afc704
                    • Instruction Fuzzy Hash: DEF0A9315456006BC22227757C0AA3B2966EBE27B1F394417F464B2391EF64C80552B1
                    APIs
                      • Part of subcall function 00DB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00DB9693
                      • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96A2
                      • Part of subcall function 00DB9639: BeginPath.GDI32(?), ref: 00DB96B9
                      • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96E2
                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00E38A4E
                    • LineTo.GDI32(?,00000003,00000000), ref: 00E38A62
                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00E38A70
                    • LineTo.GDI32(?,00000000,00000003), ref: 00E38A80
                    • EndPath.GDI32(?), ref: 00E38A90
                    • StrokePath.GDI32(?), ref: 00E38AA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                    • String ID:
                    • API String ID: 43455801-0
                    • Opcode ID: 5be73592471570d585094dafc81c33cbff41d3e202fe2dddb69b848a798f3f5b
                    • Instruction ID: a4f34f852597fffc5b3951c169663f841a7d5d7025998b0203c344445fb89af1
                    • Opcode Fuzzy Hash: 5be73592471570d585094dafc81c33cbff41d3e202fe2dddb69b848a798f3f5b
                    • Instruction Fuzzy Hash: 30111B7600024CFFDF129F95DC88EAA7F6CEB08394F108052FA19AA1A1C7719D59DFA0
                    APIs
                    • GetDC.USER32(00000000), ref: 00E05218
                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E05229
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E05230
                    • ReleaseDC.USER32(00000000,00000000), ref: 00E05238
                    • MulDiv.KERNEL32 ref: 00E0524F
                    • MulDiv.KERNEL32 ref: 00E05261
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CapsDevice$Release
                    • String ID:
                    • API String ID: 1035833867-0
                    • Opcode ID: 190d8deacec6c0d4c332e476c89b2def59d1b42334a9c6fe362044f8ea3ce34a
                    • Instruction ID: 303d02c3b8c5bbc9d4f9273cc847c69133b28064ae6e4c8f3a7e4fcf1857dfe7
                    • Opcode Fuzzy Hash: 190d8deacec6c0d4c332e476c89b2def59d1b42334a9c6fe362044f8ea3ce34a
                    • Instruction Fuzzy Hash: 0D018F76A00709BFEB109BA69C49A5EBFB8EF48751F144066FA04F7290D670D804CFA0
                    APIs
                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DA1BF4
                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00DA1BFC
                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DA1C07
                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DA1C12
                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00DA1C1A
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DA1C22
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Virtual
                    • String ID:
                    • API String ID: 4278518827-0
                    • Opcode ID: 47717f7934b72365e5ee47f23fb7cd8ad52dc942c18805c4fc6fc51235df21fd
                    • Instruction ID: d2305cb3d33a47d1f738c28f8c01394d7520ed5a6e1a200b740b9e1c6feea484
                    • Opcode Fuzzy Hash: 47717f7934b72365e5ee47f23fb7cd8ad52dc942c18805c4fc6fc51235df21fd
                    • Instruction Fuzzy Hash: 17016CB09027597DE3008F5A8C85B52FFA8FF19754F00411B915C47941C7F5A864CBE5
                    APIs
                    • PostMessageW.USER32 ref: 00E0EB30
                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E0EB46
                    • GetWindowThreadProcessId.USER32(?,?), ref: 00E0EB55
                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E0EB64
                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E0EB6E
                    • CloseHandle.KERNEL32(00000000), ref: 00E0EB75
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                    • String ID:
                    • API String ID: 839392675-0
                    • Opcode ID: 6b904fd67bd748462ee9a3396b604ca982e7d2b63472db2977c3a498eae6c4cb
                    • Instruction ID: 3222627dfc763612b099e535456f98a847a24e95c3bd3724297298b2c0b0fbf0
                    • Opcode Fuzzy Hash: 6b904fd67bd748462ee9a3396b604ca982e7d2b63472db2977c3a498eae6c4cb
                    • Instruction Fuzzy Hash: 89F01772241158BFE6215B639C0EEAB3E7CEBCAF11F104158F602F119196A09A059BB5
                    APIs
                    • GetClientRect.USER32 ref: 00DF7452
                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 00DF7469
                    • GetWindowDC.USER32(?), ref: 00DF7475
                    • GetPixel.GDI32(00000000,?,?), ref: 00DF7484
                    • ReleaseDC.USER32(?,00000000), ref: 00DF7496
                    • GetSysColor.USER32 ref: 00DF74B0
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                    • String ID:
                    • API String ID: 272304278-0
                    • Opcode ID: 5f24381f511e4b6ba2677215f58a072971adca29ed046b07ed3526b152d94d2a
                    • Instruction ID: 77f486e2b9d6e25c08edd368246319d334b7ae7dfa017870fb565e8a485ef397
                    • Opcode Fuzzy Hash: 5f24381f511e4b6ba2677215f58a072971adca29ed046b07ed3526b152d94d2a
                    • Instruction Fuzzy Hash: F7018B31400209FFEB105F65DC0DBEA7FB5FB04311F254060FA1AB20A0CB319E55AB61
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E0187F
                    • UnloadUserProfile.USERENV(?,?), ref: 00E0188B
                    • CloseHandle.KERNEL32(?), ref: 00E01894
                    • CloseHandle.KERNEL32(?), ref: 00E0189C
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00E018A5
                    • HeapFree.KERNEL32(00000000), ref: 00E018AC
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                    • String ID:
                    • API String ID: 146765662-0
                    • Opcode ID: bb7f32828fe83df61089914bf9ba0f5a5732dba465f6026e6a44dee2075dea3f
                    • Instruction ID: 8b4e0d071d753abbea10839d440e398033388bbdc5be4da5a8df31f2ebdfb8ca
                    • Opcode Fuzzy Hash: bb7f32828fe83df61089914bf9ba0f5a5732dba465f6026e6a44dee2075dea3f
                    • Instruction Fuzzy Hash: F2E0C236004109BFDA015BA2ED0C90ABF39FB49B22B218221F225B1071CB329474EB50
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 00DABEB3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Init_thread_footer
                    • String ID: D%$D%$D%$D%
                    • API String ID: 1385522511-2722557190
                    • Opcode ID: c7db29b89d633be61e0e4b293d6748c8c9d0a7f05a4f591e629d7dc70612173a
                    • Instruction ID: 92cfa59a6c6aa14a4362b951c65d77f48a16c51eee60b1aed8b47d04db6f0e89
                    • Opcode Fuzzy Hash: c7db29b89d633be61e0e4b293d6748c8c9d0a7f05a4f591e629d7dc70612173a
                    • Instruction Fuzzy Hash: 34912D75A00206DFCB14CF69C091AA9B7F1FF5A320F24815ED586AB352D731ED82DBA0
                    APIs
                    • ShellExecuteExW.SHELL32(0000003C), ref: 00E2AEA3
                      • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                    • GetProcessId.KERNEL32(00000000), ref: 00E2AF38
                    • CloseHandle.KERNEL32(00000000), ref: 00E2AF67
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseExecuteHandleProcessShell_wcslen
                    • String ID: <$@
                    • API String ID: 146682121-1426351568
                    • Opcode ID: 2199b4902888169bc3e7cde767738512c2d529a7b3846587908753038dc1af73
                    • Instruction ID: d9e8c38a55a67dd911e680b31736ea95d6ad797dcda3ff491e3313e11e502e28
                    • Opcode Fuzzy Hash: 2199b4902888169bc3e7cde767738512c2d529a7b3846587908753038dc1af73
                    • Instruction Fuzzy Hash: 78717F71A00625DFCB14EF54D484A9EBBF0FF09314F0984A9E856AB392C774ED45CBA1
                    APIs
                    • GetWindowRect.USER32(00794E28,?), ref: 00E362E2
                    • ScreenToClient.USER32(?,?), ref: 00E36315
                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001), ref: 00E36382
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$ClientMoveRectScreen
                    • String ID: Hiy
                    • API String ID: 3880355969-472783900
                    • Opcode ID: ff4cc91abbbf7e5a098ade1411d697e5e79f0dffa08d17908a22ea5aaab4266a
                    • Instruction ID: 3850720578b76cd407e2a93bcfcbf8366c338be4b53a2d63c0a8631a1dadacd1
                    • Opcode Fuzzy Hash: ff4cc91abbbf7e5a098ade1411d697e5e79f0dffa08d17908a22ea5aaab4266a
                    • Instruction Fuzzy Hash: 6F514C75900209AFCF10DF68D8889AE7FB5FF85364F209159F915AB2A0D730ED81CB50
                    APIs
                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?), ref: 00E07206
                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00E0723C
                    • GetProcAddress.KERNEL32(?,DllGetClassObject,?,?,?,?,?,?,?,?,?), ref: 00E0724D
                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00E072CF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorMode$AddressCreateInstanceProc
                    • String ID: DllGetClassObject
                    • API String ID: 753597075-1075368562
                    • Opcode ID: d872a4d60f689cc4f3d9dd5d517d4bf94a43e5ef03505203457dde7319e94d2b
                    • Instruction ID: c0fb258f981f0f1b48117aa090397255de5ad74dec8a45a75f6aa71717c76ef1
                    • Opcode Fuzzy Hash: d872a4d60f689cc4f3d9dd5d517d4bf94a43e5ef03505203457dde7319e94d2b
                    • Instruction Fuzzy Hash: F54181B1A04204EFDB15CF54C884A9A7FB9EF44314F2590A9BD45BF25AD7B0ED84CBA0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Menu$Delete$InfoItem
                    • String ID: 0$piy
                    • API String ID: 135850232-2168719060
                    • Opcode ID: 5b18b7d1c5ab5dcf52b8032b5534ae14adfd8248fd49102185b7e53955985f67
                    • Instruction ID: 5cfa56168d0e0d1c4c2ac867909fe1e0e79553945184be18fef96116dea768d2
                    • Opcode Fuzzy Hash: 5b18b7d1c5ab5dcf52b8032b5534ae14adfd8248fd49102185b7e53955985f67
                    • Instruction Fuzzy Hash: 0541AE712043019FD720DF25D884B5ABBE4EF85324F209B6DF8A5A72D1D734E984CB62
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Rect$BeepClientMessageScreenWindow
                    • String ID: Hiy
                    • API String ID: 1352109105-472783900
                    • Opcode ID: b63e290e79b8a0124e341efce0bc34e1a51637a723169a9b0cf0164e92b2b67b
                    • Instruction ID: 5376481da4f5e5a58619f7d81111e90725e39a2254ddef9b8f1c04fc9e5e4b1a
                    • Opcode Fuzzy Hash: b63e290e79b8a0124e341efce0bc34e1a51637a723169a9b0cf0164e92b2b67b
                    • Instruction Fuzzy Hash: 2E41BFB4605218EFCB21CF59C899EA97FF0FB48315F1550AAE594BB260C330E946CF90
                    APIs
                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E34705
                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E34713
                    • DestroyWindow.USER32 ref: 00E3471A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$DestroyWindow
                    • String ID: Hiy$msctls_updown32
                    • API String ID: 4014797782-431432754
                    • Opcode ID: 6d1bc261b36bf98df9d89814abd758fc45e4a4555c622fe984068588466855ad
                    • Instruction ID: 88249291f620406064228656d32be7f2b400a98018485711b081e68680294bc8
                    • Opcode Fuzzy Hash: 6d1bc261b36bf98df9d89814abd758fc45e4a4555c622fe984068588466855ad
                    • Instruction Fuzzy Hash: B8215EF5600209AFDB10DF69DC85DA73BADEB8A398F141059FA04AB291CB70FC51CA70
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    • GetCursorPos.USER32(?), ref: 00E39001
                    • TrackPopupMenuEx.USER32 ref: 00E39016
                    • GetCursorPos.USER32(?), ref: 00E3905E
                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00DF7711,?,?,?), ref: 00E39094
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                    • String ID: Hiy
                    • API String ID: 2864067406-472783900
                    • Opcode ID: b34b3d930ce0f35a7b01bdd699cb0e7353847b0ee1ea3a1d47736a7ca792eb71
                    • Instruction ID: 20e67bbca033557fca52328603a72be18e25dbf26f801b849be65f0b7fc311d0
                    • Opcode Fuzzy Hash: b34b3d930ce0f35a7b01bdd699cb0e7353847b0ee1ea3a1d47736a7ca792eb71
                    • Instruction Fuzzy Hash: D721BF35600218FFDB298F99C85CEFA7FB9EB89350F104055F905672A2C3B59990DF60
                    APIs
                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E32F8D
                    • LoadLibraryW.KERNEL32(?), ref: 00E32F94
                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E32FA9
                    • DestroyWindow.USER32 ref: 00E32FB1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$DestroyLibraryLoadWindow
                    • String ID: SysAnimate32
                    • API String ID: 3529120543-1011021900
                    • Opcode ID: 8829b6dc96caf47b51922466b906550150ac3bec5c852024ff091b2d89bc56fc
                    • Instruction ID: c2ea3aedbf39cc8416811698c286082e82d59f373a77bad958a03283c41f1f49
                    • Opcode Fuzzy Hash: 8829b6dc96caf47b51922466b906550150ac3bec5c852024ff091b2d89bc56fc
                    • Instruction Fuzzy Hash: 31218B71204209AFEB104F649C89EBB7BB9EB59368F10621CFA90B2190D671DC91D760
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00DC4D1E,00DD28E9,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002), ref: 00DC4D8D
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess,00000000,?,?,?,00DC4D1E,00DD28E9,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002), ref: 00DC4DA0
                    • FreeLibrary.KERNEL32(00000000,?,?,?,00DC4D1E,00DD28E9,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002,00000000), ref: 00DC4DC3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: 3f3350fd7278cf10d66f52635b26e59756c7c826aead2739398e380e306ea27f
                    • Instruction ID: a924ed074ad6a4a68c91306ca583a136cd352f4772a3770edd59e9f6745353e9
                    • Opcode Fuzzy Hash: 3f3350fd7278cf10d66f52635b26e59756c7c826aead2739398e380e306ea27f
                    • Instruction Fuzzy Hash: BAF03C35A40209BFDB11AF91DC4DBAEBFB5EF44751F1401A9E90AB2260CB709A44DBA1
                    APIs
                    • LoadLibraryA.KERNEL32 ref: 00DFD3AD
                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00DFD3BF
                    • FreeLibrary.KERNEL32(00000000), ref: 00DFD3E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Library$AddressFreeLoadProc
                    • String ID: GetSystemWow64DirectoryW$X64
                    • API String ID: 145871493-2590602151
                    • Opcode ID: e67ee73b94851f06a84802a8f19677a62224b202138ce702ee11e67a962c2ac0
                    • Instruction ID: 2ad04520586b5d4272f08c85db852926f3bed565f1e9d0de087e0128970fafed
                    • Opcode Fuzzy Hash: e67ee73b94851f06a84802a8f19677a62224b202138ce702ee11e67a962c2ac0
                    • Instruction Fuzzy Hash: 9EF020354066289BE7302B108C0897D3A63AF00B01B6BD098EB82F2104DB20CC44A7FB
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00DA4E9C
                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EAE
                    • FreeLibrary.KERNEL32(00000000,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EC0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Library$AddressFreeLoadProc
                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                    • API String ID: 145871493-3689287502
                    • Opcode ID: f21e72a2fe851eba3cde6533d01cf1f42236d5016347d303c58955ab2cb4f94c
                    • Instruction ID: 349fb2e4301625cfd8466616ffb47df6a155abf8d0beacedb7c249bc5ea665e3
                    • Opcode Fuzzy Hash: f21e72a2fe851eba3cde6533d01cf1f42236d5016347d303c58955ab2cb4f94c
                    • Instruction Fuzzy Hash: CCE0E636A026225F922117267C1DA5B6964AFC2B62B190115FD05F2151DBA4CE0596F1
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00DA4E62
                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E74
                    • FreeLibrary.KERNEL32(00000000,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E87
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Library$AddressFreeLoadProc
                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                    • API String ID: 145871493-1355242751
                    • Opcode ID: 41c57bed2d20133e63d1c471519e5bd6affd414e7ee1569b9270a9aae0019de2
                    • Instruction ID: de96a1d1d338614b51d61bd9070afe5fa03eccf9985b634d2439cf374f5fc7b7
                    • Opcode Fuzzy Hash: 41c57bed2d20133e63d1c471519e5bd6affd414e7ee1569b9270a9aae0019de2
                    • Instruction Fuzzy Hash: 7AD012365036215B56621B267C1CD8B6E68AFC6B513190515B915F2154CFA0CE05D6E1
                    APIs
                    • GetCurrentProcessId.KERNEL32 ref: 00E2A427
                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E2A435
                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E2A468
                    • CloseHandle.KERNEL32(?), ref: 00E2A63D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$CloseCountersCurrentHandleOpen
                    • String ID:
                    • API String ID: 3488606520-0
                    • Opcode ID: 44aaaeb51b87f589e55a711ec3cfbb568804607cc7dd6d06902a9029bc54f73a
                    • Instruction ID: 0fdfd866896e32bbadb9cc74372c2084e26fc366b1a414f4ff29c0147a8cf216
                    • Opcode Fuzzy Hash: 44aaaeb51b87f589e55a711ec3cfbb568804607cc7dd6d06902a9029bc54f73a
                    • Instruction Fuzzy Hash: BCA181716043019FD720DF24D886F2AB7E5EF88714F18986DF55AAB2D2D770EC418BA2
                    APIs
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E43700), ref: 00DDBB91
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00E7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DDBC09
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00E71270,000000FF,?,0000003F,00000000,?), ref: 00DDBC36
                    • _free.LIBCMT ref: 00DDBB7F
                      • Part of subcall function 00DD29C8: HeapFree.KERNEL32(00000000,00000000), ref: 00DD29DE
                      • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                    • _free.LIBCMT ref: 00DDBD4B
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                    • String ID:
                    • API String ID: 1286116820-0
                    • Opcode ID: 7d95a8f457d5bb33a49138edf889d628574e9267d89cfc0b6aa2c1e5a5d798e8
                    • Instruction ID: 11afe16c29345662f9bb561f24a3edbc0f743e8392b67cf380a010a4ee77ba11
                    • Opcode Fuzzy Hash: 7d95a8f457d5bb33a49138edf889d628574e9267d89cfc0b6aa2c1e5a5d798e8
                    • Instruction Fuzzy Hash: 8151C871900209EFCB10DF7A9C4196AB7BCFB40374B1642ABE554E73A1EB709D449B70
                    APIs
                      • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E0CF22,?), ref: 00E0DDFD
                      • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E0CF22,?), ref: 00E0DE16
                      • Part of subcall function 00E0E199: GetFileAttributesW.KERNEL32(?,00E0CF95), ref: 00E0E19A
                    • lstrcmpiW.KERNEL32(?,?), ref: 00E0E473
                    • MoveFileW.KERNEL32 ref: 00E0E4AC
                    • _wcslen.LIBCMT ref: 00E0E5EB
                    • _wcslen.LIBCMT ref: 00E0E603
                    • SHFileOperationW.SHELL32 ref: 00E0E650
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                    • String ID:
                    • API String ID: 3183298772-0
                    • Opcode ID: c512ee31a2acaa7b2152ed10d370adf7523f711177c88b9bfe2535a40d82e5b7
                    • Instruction ID: 13080aab4f7a3fb6f53aa5b926a35cb8026e8051d4c28a29a96c4a94b2f4058e
                    • Opcode Fuzzy Hash: c512ee31a2acaa7b2152ed10d370adf7523f711177c88b9bfe2535a40d82e5b7
                    • Instruction Fuzzy Hash: A95160B24083455BC724EBA0DC91ADBB3ECEF85344F104D2EF589E3191EE75A6888776
                    APIs
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                      • Part of subcall function 00E2C998: CharUpperBuffW.USER32(?,?), ref: 00E2C9B5
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2C9F1
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA68
                      • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA9E
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2BAA5
                    • RegOpenKeyExW.ADVAPI32 ref: 00E2BB00
                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E2BB63
                    • RegCloseKey.ADVAPI32(?), ref: 00E2BBA6
                    • RegCloseKey.ADVAPI32(00000000), ref: 00E2BBB3
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                    • String ID:
                    • API String ID: 826366716-0
                    • Opcode ID: 758349637e1d64037aaacea7b538c2da8615146638ba64fdf878f1e1e1f62cdf
                    • Instruction ID: cf83302560576e84e558ffc5b0b943968c3a86f3dbc9e9d9f264003cb4fd779e
                    • Opcode Fuzzy Hash: 758349637e1d64037aaacea7b538c2da8615146638ba64fdf878f1e1e1f62cdf
                    • Instruction Fuzzy Hash: 1C61C171208241AFC314DF24D894E2ABBE5FF85308F54955CF49A9B2A2CB31ED45CFA2
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00E08BCD
                    • VariantClear.OLEAUT32 ref: 00E08C3E
                    • VariantClear.OLEAUT32 ref: 00E08C9D
                    • VariantClear.OLEAUT32(?), ref: 00E08D10
                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E08D3B
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$Clear$ChangeInitType
                    • String ID:
                    • API String ID: 4136290138-0
                    • Opcode ID: 4225b7cc55d308b894df177e0319f1fd0abc0df8b6c675d6b53d916cf297abde
                    • Instruction ID: 1a778d0ba892349ea151b3cf2dfdc1ffcccb6b31ca875fa2cb3afb8edee1cb70
                    • Opcode Fuzzy Hash: 4225b7cc55d308b894df177e0319f1fd0abc0df8b6c675d6b53d916cf297abde
                    • Instruction Fuzzy Hash: 1D518BB1A00219EFCB14CF68C894AAABBF8FF89314B118559F955EB350E730E951CF90
                    APIs
                    • GetPrivateProfileSectionW.KERNEL32 ref: 00E18BAE
                    • GetPrivateProfileSectionW.KERNEL32 ref: 00E18BDA
                    • WritePrivateProfileSectionW.KERNEL32 ref: 00E18C32
                    • WritePrivateProfileStringW.KERNEL32 ref: 00E18C57
                    • WritePrivateProfileStringW.KERNEL32 ref: 00E18C5F
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: PrivateProfile$SectionWrite$String
                    • String ID:
                    • API String ID: 2832842796-0
                    • Opcode ID: bbe7db89913b5dc00fb43655b43489fc080df10defa88bf3036c7113213897dd
                    • Instruction ID: 1787949f79751f3475d43c12ca0a1bddee75a3f484e1787fdbfa902f729296a4
                    • Opcode Fuzzy Hash: bbe7db89913b5dc00fb43655b43489fc080df10defa88bf3036c7113213897dd
                    • Instruction Fuzzy Hash: 96514C35A00214DFCB00DF65C881AAABBF5FF49314F088458E849AB3A2CB31ED51CBA1
                    APIs
                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00E28F40
                    • GetProcAddress.KERNEL32(00000000,?,00000000,?), ref: 00E28FD0
                    • GetProcAddress.KERNEL32(00000000,00000000,00000000,?), ref: 00E28FEC
                    • GetProcAddress.KERNEL32(00000000,?,00000041), ref: 00E29032
                    • FreeLibrary.KERNEL32(00000000), ref: 00E29052
                      • Part of subcall function 00DBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00E11043,?,759D3F18), ref: 00DBF6E6
                      • Part of subcall function 00DBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00DFFA64,00000000,00000000,?,?,00E11043,?,759D3F18,?,00DFFA64), ref: 00DBF70D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                    • String ID:
                    • API String ID: 666041331-0
                    • Opcode ID: 8a219e8b6024eaf75a70e34c3c6164c502df8d28970aacd38289230ae8d63eb2
                    • Instruction ID: 8679b7a01743808be4e92e623d1bd46099c20ff3f8ddd4c72e2e46e0fdafd067
                    • Opcode Fuzzy Hash: 8a219e8b6024eaf75a70e34c3c6164c502df8d28970aacd38289230ae8d63eb2
                    • Instruction Fuzzy Hash: 7B512935601219DFC711DF54C5948ADBBB1FF49324F089099E806AB362DB31ED86CBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: c2fd14a80a240cf83560d5c6417c4806279983ec783c1731fac31cee9446ecc9
                    • Instruction ID: 50e0562e27e75ea5eef7bbd774226e852f6f6d3149491c8dab4a8f2d0be8d9ab
                    • Opcode Fuzzy Hash: c2fd14a80a240cf83560d5c6417c4806279983ec783c1731fac31cee9446ecc9
                    • Instruction Fuzzy Hash: 5241A132A00200AFCB24DF78C881A7EB7B5EF99314B1985AAE555EB355D731ED01DBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: AsyncState$ClientCursorScreen
                    • String ID:
                    • API String ID: 4210589936-0
                    • Opcode ID: e3bd6b5cc8972323a37bc922128fff4d68945182ea8625f9f711acbd6533bbeb
                    • Instruction ID: 52d6e59da1c22e82c22528c71fb147a52b8cb7d34df308d813e2caa98ff9a94b
                    • Opcode Fuzzy Hash: e3bd6b5cc8972323a37bc922128fff4d68945182ea8625f9f711acbd6533bbeb
                    • Instruction Fuzzy Hash: 77418F3190860AFBDF059F68C858BFEFB74FF05360F258219E569A6290C7309954DB61
                    APIs
                    • GetInputState.USER32 ref: 00E138CB
                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00E13922
                    • TranslateMessage.USER32(?), ref: 00E1394B
                    • DispatchMessageW.USER32(?), ref: 00E13955
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E13966
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                    • String ID:
                    • API String ID: 2256411358-0
                    • Opcode ID: 45731f38d73bbe4b9323174ee5ef8e61e3517c58bae6dd03cf6e5eb77e5aa4a6
                    • Instruction ID: 56991dcec286d39367b501580894f4acaea274656db2d8e4dd9791c0ae2011d6
                    • Opcode Fuzzy Hash: 45731f38d73bbe4b9323174ee5ef8e61e3517c58bae6dd03cf6e5eb77e5aa4a6
                    • Instruction Fuzzy Hash: D631D970504345AEEB35CB359849FF67BA4EB45308F1415ADD466B20D4E3B496C9CB11
                    APIs
                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 00E1CF38
                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00E1CF6F
                    • GetLastError.KERNEL32(?,00000000,?,?,?,00E1C21E,00000000), ref: 00E1CFB4
                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E1C21E,00000000), ref: 00E1CFC8
                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E1C21E,00000000), ref: 00E1CFF2
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                    • String ID:
                    • API String ID: 3191363074-0
                    • Opcode ID: 1236d3fa88011fadc28e9da86322244a9565d55d31f28c711bcd769f3eeee6e5
                    • Instruction ID: 70e7269f7f474f2ac4fe3a46378906555620ba2bbd99f1957cff1218687b40cb
                    • Opcode Fuzzy Hash: 1236d3fa88011fadc28e9da86322244a9565d55d31f28c711bcd769f3eeee6e5
                    • Instruction Fuzzy Hash: 19315071644605EFDB20DFA5C888AEBBBF9EB18354B20542EF516F2150DB30ED86DB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessagePostSleep$RectWindow
                    • String ID:
                    • API String ID: 3382505437-0
                    • Opcode ID: 3eecb679da2a810023595b7495e48972604ebbcc37d969f2e10b20ce3cdb81f2
                    • Instruction ID: f26771c7152710f0b612348ff22d479b38530e34af407346fc144625238b4b92
                    • Opcode Fuzzy Hash: 3eecb679da2a810023595b7495e48972604ebbcc37d969f2e10b20ce3cdb81f2
                    • Instruction Fuzzy Hash: 8E31BF71A00219EFCB00CFA8CD99ADE3BB5EB45319F505269F921BB2D1C770D984DB91
                    APIs
                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E35745
                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E3579D
                    • _wcslen.LIBCMT ref: 00E357AF
                    • _wcslen.LIBCMT ref: 00E357BA
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E35816
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$_wcslen
                    • String ID:
                    • API String ID: 763830540-0
                    • Opcode ID: 6c9828673a10c2e6b2b4b8c59e67581b07c446a765188d269f55a0782d25ee4c
                    • Instruction ID: 6365d7d64cfaf5be040aa3cc4344d1d6c1360cdc329955f040dc88944a720d17
                    • Opcode Fuzzy Hash: 6c9828673a10c2e6b2b4b8c59e67581b07c446a765188d269f55a0782d25ee4c
                    • Instruction Fuzzy Hash: C2218572904618DADB209FA5CC89AED7FB8FF44724F109256F929FB280D7708985CF51
                    APIs
                    • IsWindow.USER32(00000000), ref: 00E20951
                    • GetForegroundWindow.USER32 ref: 00E20968
                    • GetDC.USER32(00000000), ref: 00E209A4
                    • GetPixel.GDI32(00000000,?,00000003), ref: 00E209B0
                    • ReleaseDC.USER32(00000000,00000003), ref: 00E209E8
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$ForegroundPixelRelease
                    • String ID:
                    • API String ID: 4156661090-0
                    • Opcode ID: ffe185a727300d73c5ba4964be758adfed04db20424475dafd68dc15b7ef9ee4
                    • Instruction ID: beec60ec66a1aa003260b82011478b367297b2b50e74aa036006c4d69864d4d6
                    • Opcode Fuzzy Hash: ffe185a727300d73c5ba4964be758adfed04db20424475dafd68dc15b7ef9ee4
                    • Instruction Fuzzy Hash: B2218435600214AFD704EF65D849A9EBBF5EF85710F148469F846B7762CB30EC44CB60
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 00DDCDC6
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DDCDE9
                      • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00DDCE0F
                    • _free.LIBCMT ref: 00DDCE22
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DDCE31
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                    • String ID:
                    • API String ID: 336800556-0
                    • Opcode ID: 5f47f1f5d5203224b6b1213e3742a5851e0f81cae66f7df16e031c68979e4cd8
                    • Instruction ID: dab87e36337d013438662e60d33d3e2c1b1307f99c5f6485d10d5639f60b180e
                    • Opcode Fuzzy Hash: 5f47f1f5d5203224b6b1213e3742a5851e0f81cae66f7df16e031c68979e4cd8
                    • Instruction Fuzzy Hash: 990188B26122167F272116BB6C4CD7BBE6DDFC6BA1729112BF905E7301DA61CD01D2B0
                    APIs
                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00DB9693
                    • SelectObject.GDI32(?,00000000), ref: 00DB96A2
                    • BeginPath.GDI32(?), ref: 00DB96B9
                    • SelectObject.GDI32(?,00000000), ref: 00DB96E2
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ObjectSelect$BeginCreatePath
                    • String ID:
                    • API String ID: 3225163088-0
                    • Opcode ID: 8c40c6a798c43237a4b3711152d46b1fb90463d0ab2c1cae20f0c533ce7bdd2f
                    • Instruction ID: 6c7d55dc13a1473819a5df0fced278252fed33d2f7634389f6da05c4d23bee2d
                    • Opcode Fuzzy Hash: 8c40c6a798c43237a4b3711152d46b1fb90463d0ab2c1cae20f0c533ce7bdd2f
                    • Instruction Fuzzy Hash: 0521B330802349EFDB10DF2ADC287E9BBB4BB90355F144256F615B60B0D370988ACFA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: d2e3c2c7a55a6d0f2fa4a7a5e3f2556f07af60a434bf31d7d3a16b14c4074175
                    • Instruction ID: 233d655fdf84f2bd24cd2a053acafdeb58ee9fa6c4b5a6c6d8eff98e170118fb
                    • Opcode Fuzzy Hash: d2e3c2c7a55a6d0f2fa4a7a5e3f2556f07af60a434bf31d7d3a16b14c4074175
                    • Instruction Fuzzy Hash: 2F01D6A7681616BAD70851109E42FFB634CDB21398F081026FD04BB282F620ED61D6B1
                    APIs
                    • GetLastError.KERNEL32(?,?,?,00DCF2DE,00DD3863,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6), ref: 00DD2DFD
                    • _free.LIBCMT ref: 00DD2E32
                    • _free.LIBCMT ref: 00DD2E59
                    • SetLastError.KERNEL32(00000000,00DA1129), ref: 00DD2E66
                    • SetLastError.KERNEL32(00000000,00DA1129), ref: 00DD2E6F
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLast$_free
                    • String ID:
                    • API String ID: 3170660625-0
                    • Opcode ID: a54f7ad8dd94842878b6cbb0292569d22237ff0880b5deeb86eb5508c931c5a0
                    • Instruction ID: f1285439526997bc27fd241522649773ee107808bb1cb8bade9bd63b567f89ad
                    • Opcode Fuzzy Hash: a54f7ad8dd94842878b6cbb0292569d22237ff0880b5deeb86eb5508c931c5a0
                    • Instruction Fuzzy Hash: 6901F4326456006FC61227766C4AD3B2B6DEBF13B2B39442BF465B3392EBB1CC054130
                    APIs
                    • CLSIDFromProgID.OLE32 ref: 00E0002B
                    • ProgIDFromCLSID.OLE32(?,00000000), ref: 00E00046
                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?), ref: 00E00054
                    • CoTaskMemFree.OLE32(00000000), ref: 00E00064
                    • CLSIDFromString.OLE32(?,?), ref: 00E00070
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: From$Prog$FreeStringTasklstrcmpi
                    • String ID:
                    • API String ID: 3897988419-0
                    • Opcode ID: 35a8ef3cd2b2181b07b4dc78205cd6eba5c14f2ab910a3d21c8c8bc8ab4358c5
                    • Instruction ID: 15c093716e03cf9d970c207622aaec0e59a3fca8f719ce5fb117184c0dd399c0
                    • Opcode Fuzzy Hash: 35a8ef3cd2b2181b07b4dc78205cd6eba5c14f2ab910a3d21c8c8bc8ab4358c5
                    • Instruction Fuzzy Hash: FB01A276600208BFDB154F69DC08BAA7EEDEF44751F245524F905F2250DB71DE849BA0
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?), ref: 00E0E997
                    • QueryPerformanceFrequency.KERNEL32(?), ref: 00E0E9A5
                    • Sleep.KERNEL32(00000000), ref: 00E0E9AD
                    • QueryPerformanceCounter.KERNEL32(?), ref: 00E0E9B7
                    • Sleep.KERNEL32 ref: 00E0E9F3
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: PerformanceQuery$CounterSleep$Frequency
                    • String ID:
                    • API String ID: 2833360925-0
                    • Opcode ID: 3d76287ee03650e12c38da227904b08ac2c21ba1db88aedf792c7b1c33eff349
                    • Instruction ID: 6c9074798e201fe94ee86039aa5b97170fb3ba47a289cdcd57306b5194084044
                    • Opcode Fuzzy Hash: 3d76287ee03650e12c38da227904b08ac2c21ba1db88aedf792c7b1c33eff349
                    • Instruction Fuzzy Hash: 1C015B31C0162DDBCF04ABE6DC496EDBB78FB48301F5009A6E502B2290CB30959487A1
                    APIs
                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E01114
                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01120
                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E0112F
                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01136
                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E0114D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 842720411-0
                    • Opcode ID: 4fd0318da39c133492c96d41cbb07da63c5e780e228c257b85ce9abf6ffddf2c
                    • Instruction ID: 9f419198837c209743f78ae2de1d27ed300768c94156b8b58f7bbe38e52839b1
                    • Opcode Fuzzy Hash: 4fd0318da39c133492c96d41cbb07da63c5e780e228c257b85ce9abf6ffddf2c
                    • Instruction Fuzzy Hash: A5016975201209BFDB154FA6DC4DA6A3F6EEF893A4B200459FA41E73A0DA31DC409B60
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E00FCA
                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E00FD6
                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E00FE5
                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E00FEC
                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E01002
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: 93a0f995cdcbafe41969f7482c2981f6585981643e9df7fc2578689dd5b4780b
                    • Instruction ID: 20d54550be715d60cdadae5c254b8cd0785d1ac989e790eab9bd8ee46aa7c048
                    • Opcode Fuzzy Hash: 93a0f995cdcbafe41969f7482c2981f6585981643e9df7fc2578689dd5b4780b
                    • Instruction Fuzzy Hash: AFF0AF35200305AFD7210FA59C4DF563F6EEF89761F210454F945FB290CA31DC809B60
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E0102A
                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E01036
                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01045
                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E0104C
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01062
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: 7ff2225ca8e4d3b045a9a490a4bcc798088c23c927805c978ae38e37287709ee
                    • Instruction ID: 22e8b83a90b8245d486cfdf1ee0ea1d834c0fd78a7b0795a6b36bb1f1aadca66
                    • Opcode Fuzzy Hash: 7ff2225ca8e4d3b045a9a490a4bcc798088c23c927805c978ae38e37287709ee
                    • Instruction Fuzzy Hash: A8F0AF35200305AFD7211FA5EC4CF563F6DEF89761F210414F985FB290CA31D8809B60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseHandle
                    • String ID:
                    • API String ID: 2962429428-0
                    • Opcode ID: 28c029c5af3e5a3f775d94fb1f8686fdfb3fc3d8a489d3c9ab718976e531bef0
                    • Instruction ID: 7ba9d215114aeb2b6a7a564ddb389b85801b106fbee77a0b0a44c93f069d2898
                    • Opcode Fuzzy Hash: 28c029c5af3e5a3f775d94fb1f8686fdfb3fc3d8a489d3c9ab718976e531bef0
                    • Instruction Fuzzy Hash: 8801A272800B159FC730AF66D880452FBF5BF503193159A3FD1A662931C3B1A999DF80
                    APIs
                    • _free.LIBCMT ref: 00DDD752
                      • Part of subcall function 00DD29C8: HeapFree.KERNEL32(00000000,00000000), ref: 00DD29DE
                      • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                    • _free.LIBCMT ref: 00DDD764
                    • _free.LIBCMT ref: 00DDD776
                    • _free.LIBCMT ref: 00DDD788
                    • _free.LIBCMT ref: 00DDD79A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: e5b7223fe4d622cfd4c6fd2055026ae24974280f10bf25ee10f260d6fe3850f3
                    • Instruction ID: c705328e1346b6f3e08c02955011d0f80ba3d2b21358a7bd5663ce92528cb784
                    • Opcode Fuzzy Hash: e5b7223fe4d622cfd4c6fd2055026ae24974280f10bf25ee10f260d6fe3850f3
                    • Instruction Fuzzy Hash: 6FF0FF32584204BB8A25EB65FDC5C2777DEFB54750BA81847F099E7601C774FC808A74
                    APIs
                    • _free.LIBCMT ref: 00DD22BE
                      • Part of subcall function 00DD29C8: HeapFree.KERNEL32(00000000,00000000), ref: 00DD29DE
                      • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                    • _free.LIBCMT ref: 00DD22D0
                    • _free.LIBCMT ref: 00DD22E3
                    • _free.LIBCMT ref: 00DD22F4
                    • _free.LIBCMT ref: 00DD2305
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: d3a066bae75cabc3407ecee35f2c1bf6c95484126c82afd1e9bb16e7bb9d9784
                    • Instruction ID: 136f8b763ba76d0b3e20dec52a0fb91d03ec9b8cc3e92926eb5a5adfa39d0c29
                    • Opcode Fuzzy Hash: d3a066bae75cabc3407ecee35f2c1bf6c95484126c82afd1e9bb16e7bb9d9784
                    • Instruction Fuzzy Hash: 29F030705402518F8626EF6ABC118293B64F7287907140547F418F3372CB701499BFB4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Path$ObjectStroke$DeleteFillSelect
                    • String ID:
                    • API String ID: 2625713937-0
                    • Opcode ID: 254bac3e6d00f560783a56b66c120634b6512a038ca75cd7d78be32a0ce2d4e1
                    • Instruction ID: 1dfb0c871d18428030214abc4cd9499c82951f64f16ea7af83471fadfca31fed
                    • Opcode Fuzzy Hash: 254bac3e6d00f560783a56b66c120634b6512a038ca75cd7d78be32a0ce2d4e1
                    • Instruction Fuzzy Hash: 6FF0E131006348DFD7269F5AED1C7A47F65A741362F148254F65A750F4C730859ADF20
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: __freea$_free
                    • String ID: a/p$am/pm
                    • API String ID: 3432400110-3206640213
                    • Opcode ID: 84ebb722e8f51818743f0e0d5eeae2982674ae62ca6ad54d9b4d1147ab4dca9f
                    • Instruction ID: 151b4d08802d03a53f485a95a3d165581539d01239e1eea075cae488b9743d85
                    • Opcode Fuzzy Hash: 84ebb722e8f51818743f0e0d5eeae2982674ae62ca6ad54d9b4d1147ab4dca9f
                    • Instruction Fuzzy Hash: 28D1E239900206EADB289F68C855BFEBBB1EF05300F28425BE945AB751D3759D80CBB1
                    APIs
                      • Part of subcall function 00DC0242: EnterCriticalSection.KERNEL32(00E7070C,00E71884,?,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC024D
                      • Part of subcall function 00DC0242: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC028A
                      • Part of subcall function 00DC00A3: __onexit.LIBCMT ref: 00DC00A9
                    • __Init_thread_footer.LIBCMT ref: 00E26238
                      • Part of subcall function 00DC01F8: EnterCriticalSection.KERNEL32(00E7070C,?,?,00DB8747,00E72514), ref: 00DC0202
                      • Part of subcall function 00DC01F8: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB8747,00E72514), ref: 00DC0235
                      • Part of subcall function 00E1359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E135E4
                      • Part of subcall function 00E1359C: LoadStringW.USER32(00E72390,?,00000FFF,?), ref: 00E1360A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                    • String ID: x#$x#$x#
                    • API String ID: 1072379062-1894725482
                    • Opcode ID: 121a2c8c7c8681d019efb14f4ac49508c3676f2bf83f9f15c3b7f524195da5f7
                    • Instruction ID: 5c120cda34739a834585abb3c63a6d16a323b7655ca0bd32114ee0349247affd
                    • Opcode Fuzzy Hash: 121a2c8c7c8681d019efb14f4ac49508c3676f2bf83f9f15c3b7f524195da5f7
                    • Instruction Fuzzy Hash: DDC19B71A00115AFCB14EF98D891EBEB7B9FF48304F148169F955AB291DB70ED44CBA0
                    APIs
                      • Part of subcall function 00DC0242: EnterCriticalSection.KERNEL32(00E7070C,00E71884,?,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC024D
                      • Part of subcall function 00DC0242: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC028A
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                      • Part of subcall function 00DC00A3: __onexit.LIBCMT ref: 00DC00A9
                    • __Init_thread_footer.LIBCMT ref: 00E27BFB
                      • Part of subcall function 00DC01F8: EnterCriticalSection.KERNEL32(00E7070C,?,?,00DB8747,00E72514), ref: 00DC0202
                      • Part of subcall function 00DC01F8: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB8747,00E72514), ref: 00DC0235
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                    • String ID: 5$G$Variable must be of type 'Object'.
                    • API String ID: 535116098-3733170431
                    • Opcode ID: 9bc7ccab9a8e9131fccc5098d049d2ff7d59b45eed7e163c8d53b41a073d1113
                    • Instruction ID: 75247ed2c4821a2ff7860a8b132279beab605ad896ba9cbad0a775626928b1b1
                    • Opcode Fuzzy Hash: 9bc7ccab9a8e9131fccc5098d049d2ff7d59b45eed7e163c8d53b41a073d1113
                    • Instruction Fuzzy Hash: 72918C70A04219EFCB14EF64E891DADB7B1FF49304F149059F886BB292DB71AE41CB61
                    APIs
                      • Part of subcall function 00E0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E021D0,?,?,00000034,00000800,?,00000034), ref: 00E0B42D
                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E02760
                      • Part of subcall function 00E0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00E0B3F8
                      • Part of subcall function 00E0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00E0B355
                      • Part of subcall function 00E0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E02194,00000034,?,?,00001004,00000000,00000000), ref: 00E0B365
                      • Part of subcall function 00E0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E02194,00000034,?,?,00001004,00000000,00000000), ref: 00E0B37B
                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E027CD
                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E0281A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                    • String ID: @
                    • API String ID: 4150878124-2766056989
                    • Opcode ID: ca8e701e8dfc63cd08178f51512a6146ec3ee143a8b05eaba3618a5fb7208535
                    • Instruction ID: 6cd08ce020800c2dc9ea5ccd26da4dd1b8af8311952e0eeb597900cf8d07cb4c
                    • Opcode Fuzzy Hash: ca8e701e8dfc63cd08178f51512a6146ec3ee143a8b05eaba3618a5fb7208535
                    • Instruction Fuzzy Hash: F8412E76900218AFDB10DFA4CD46BEEBBB8EF09700F109059FA55B7181DB706E85CBA1
                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\New order.exe,00000104), ref: 00DD1769
                    • _free.LIBCMT ref: 00DD1834
                    • _free.LIBCMT ref: 00DD183E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free$FileModuleName
                    • String ID: C:\Users\user\Desktop\New order.exe
                    • API String ID: 2506810119-3516693560
                    • Opcode ID: 1f818e13ed5c263bb71c263020fa08c382640710eda1642a8e7cb358a40a0c52
                    • Instruction ID: 37fcba78382f4e148cb485a4ce0ef7a77e6605ced483fc5cd4b0e2981176aecc
                    • Opcode Fuzzy Hash: 1f818e13ed5c263bb71c263020fa08c382640710eda1642a8e7cb358a40a0c52
                    • Instruction Fuzzy Hash: F9317E79A40259FFDB21DB999885D9EBBBCEB85310B1441A7F404E7321D7708A44DBB0
                    APIs
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E344AA
                    • GetWindowLongW.USER32 ref: 00E344C7
                    • SetWindowLongW.USER32 ref: 00E344D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Long
                    • String ID: SysTreeView32
                    • API String ID: 847901565-1698111956
                    • Opcode ID: b891c038bf14318f1acb343c17ed2232527edbd27bdf425e248c05c511c77168
                    • Instruction ID: 0b22f185a6288aa06c31f32b9bd8eb1b1a8e63d8cb166a4ee05e25e347753582
                    • Opcode Fuzzy Hash: b891c038bf14318f1acb343c17ed2232527edbd27bdf425e248c05c511c77168
                    • Instruction Fuzzy Hash: 41318D72210205AFDB219E38DC49BEA7BA9EB09338F205725F975B21D0D770EC50D760
                    APIs
                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00E3461F
                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E34634
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: '$Hiy
                    • API String ID: 3850602802-2046622062
                    • Opcode ID: aa3de6511815235eb8f36ea8a549b4c517a9a88ff000109d7ebc761ccd522a5d
                    • Instruction ID: 2d67c6ac6225cdea8329dae6d42459dc9c9472e42b2d80dcc170f37fc1239539
                    • Opcode Fuzzy Hash: aa3de6511815235eb8f36ea8a549b4c517a9a88ff000109d7ebc761ccd522a5d
                    • Instruction Fuzzy Hash: 4F3138B5E00309AFDB14CFA9C985BDABBB5FF49304F10506AE904AB381D770A941CF90
                    APIs
                    • SysReAllocString.OLEAUT32(?,?), ref: 00E06EED
                    • VariantCopyInd.OLEAUT32(?,?), ref: 00E06F08
                    • VariantClear.OLEAUT32(?), ref: 00E06F12
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$AllocClearCopyString
                    • String ID: *j
                    • API String ID: 2173805711-1845181700
                    • Opcode ID: b27aacdd79d6a80efa2ce9a4c3df8c28d7f7fe6e86c3dbacb5dfc2c91e7bfff7
                    • Instruction ID: e183d1469a3e75c743b5ceb2118a3c5616b4dfd83c34e22d49dc4ac63d1d0d43
                    • Opcode Fuzzy Hash: b27aacdd79d6a80efa2ce9a4c3df8c28d7f7fe6e86c3dbacb5dfc2c91e7bfff7
                    • Instruction Fuzzy Hash: B931A272704246DFCB05AFA4E851ABD37B6FF85714B1004A9F9126B2E2C7349962DBF0
                    APIs
                      • Part of subcall function 00E2335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00E23077,?,?), ref: 00E23378
                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E2307A
                    • _wcslen.LIBCMT ref: 00E2309B
                    • htons.WSOCK32(00000000,?,?,00000000), ref: 00E23106
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                    • String ID: 255.255.255.255
                    • API String ID: 946324512-2422070025
                    • Opcode ID: 81e6c644fb3d8a87dfeda7cee8cfd43bb283a225411b55c859c88a1c2b6fd1fe
                    • Instruction ID: 41be152fec56d30ff42831aa398765481d1089fe7788c6417600d8ab3aef5771
                    • Opcode Fuzzy Hash: 81e6c644fb3d8a87dfeda7cee8cfd43bb283a225411b55c859c88a1c2b6fd1fe
                    • Instruction Fuzzy Hash: C631D5352002259FC720CF78D486EAA77E0EF55318F249059E915AB392DB79EF45CB70
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen
                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                    • API String ID: 176396367-2734436370
                    • Opcode ID: 2ec8c58a2067a993b221f3282e0f24d1727ebf051600bad5d6bb13652ccaa946
                    • Instruction ID: d65509e8d917ae15854f0f8cefbc599fdb900e22a4ead29ccb85c40b34e7c9b2
                    • Opcode Fuzzy Hash: 2ec8c58a2067a993b221f3282e0f24d1727ebf051600bad5d6bb13652ccaa946
                    • Instruction Fuzzy Hash: 6521087210461166D331AF25AC06FB77398DF55314F14502AF949B71C3EB529D81D2B5
                    APIs
                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E33840
                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E33850
                    • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00E33876
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend$MoveWindow
                    • String ID: Listbox
                    • API String ID: 3315199576-2633736733
                    • Opcode ID: 1234579d9814f200271d2880c555b9b8556a9e063744a844dffc2f9956659e68
                    • Instruction ID: 44ae0c8c0e039e5e647e023ee42fffa5fe0e6b26e35695b6a2fcdc94c0ec4842
                    • Opcode Fuzzy Hash: 1234579d9814f200271d2880c555b9b8556a9e063744a844dffc2f9956659e68
                    • Instruction Fuzzy Hash: 9121B072610218BBEB218F65DC49EAB3B6AEF89754F119115F904AB190C671DC52C7A0
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00E14A08
                    • GetVolumeInformationW.KERNEL32 ref: 00E14A5C
                    • SetErrorMode.KERNEL32(00000000,?,?,00E3CC08), ref: 00E14AD0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorMode$InformationVolume
                    • String ID: %lu
                    • API String ID: 2507767853-685833217
                    • Opcode ID: 72802eeef5fec6b0ceec6192b075fefa2d0f09959c8565491c72ba322cbc199b
                    • Instruction ID: 3a71414d7a3c692bf3cc9450a24765533153ecdb6b66c03b75671f4eadbc12d0
                    • Opcode Fuzzy Hash: 72802eeef5fec6b0ceec6192b075fefa2d0f09959c8565491c72ba322cbc199b
                    • Instruction Fuzzy Hash: B2312F75A00109AFD710DF54C885EAABBF8EF05318F149095F505EB252D771EE45CB71
                    APIs
                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E3424F
                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E34264
                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E34271
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: msctls_trackbar32
                    • API String ID: 3850602802-1010561917
                    • Opcode ID: 354ea747ee9a96a0d482dd672f99b8dcb123601ad14b52d25cbe8cb27d25b388
                    • Instruction ID: 55656a0d9be7c72cb893396759f78c20f65d61fbad5e9a04efe255fb539c5988
                    • Opcode Fuzzy Hash: 354ea747ee9a96a0d482dd672f99b8dcb123601ad14b52d25cbe8cb27d25b388
                    • Instruction Fuzzy Hash: 3811A371240248BEEF205E69CC0AFAB3BACEF95B58F111514FA55F60E0D671E851DB20
                    APIs
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                      • Part of subcall function 00E02DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E02DC5
                      • Part of subcall function 00E02DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E02DD6
                      • Part of subcall function 00E02DA7: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000), ref: 00E02DDD
                      • Part of subcall function 00E02DA7: AttachThreadInput.USER32(00000000,?,00000000), ref: 00E02DE4
                    • GetFocus.USER32 ref: 00E02F78
                      • Part of subcall function 00E02DEE: GetParent.USER32(00000000), ref: 00E02DF9
                    • GetClassNameW.USER32(?,?,00000100), ref: 00E02FC3
                    • EnumChildWindows.USER32 ref: 00E02FEB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                    • String ID: %s%d
                    • API String ID: 1272988791-1110647743
                    • Opcode ID: 3b4a0d4f03f83763e8c4654bede96febf5f327f7b558a413b156d40f8a8a449f
                    • Instruction ID: 0e5dc82f682d163f5cda5e724da90a74056152ce68883ea6bdb722827bb1dfae
                    • Opcode Fuzzy Hash: 3b4a0d4f03f83763e8c4654bede96febf5f327f7b558a413b156d40f8a8a449f
                    • Instruction Fuzzy Hash: B911A271700209ABCF157F708C8AEED77AAAF94304F146079B909BB192DE3099898B70
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Menu$InfoItem$Draw
                    • String ID: 0
                    • API String ID: 3227129158-4108050209
                    • Opcode ID: d6fd837919a69c2869da6e1fc58d438019b0998a49cff0583b78151719cabcc8
                    • Instruction ID: c74bac9a48d32fc0377bd320d01d36eced38ee56bc785b494275c8d3a12b978e
                    • Opcode Fuzzy Hash: d6fd837919a69c2869da6e1fc58d438019b0998a49cff0583b78151719cabcc8
                    • Instruction Fuzzy Hash: A9011B32500218EEDB219F11DC49BEEBFB5FB85365F108099F859E6251DB308A94DF31
                    APIs
                    • GetForegroundWindow.USER32 ref: 00E37805
                    • GetFocus.USER32 ref: 00E3780D
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                      • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                    • SendMessageW.USER32(00794E28,000000B0,000001BC,000001C0), ref: 00E3787A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Long$FocusForegroundMessageSend
                    • String ID: Hiy
                    • API String ID: 3601265619-472783900
                    • Opcode ID: 9502c80e98cb73bd546bfcd63345dabf67fe2246cf9efbe98cddfe26d5d3f684
                    • Instruction ID: b1648c4566485a2a824b0b7141a57d3901e644c6587cf5c4d82119b5af9bec90
                    • Opcode Fuzzy Hash: 9502c80e98cb73bd546bfcd63345dabf67fe2246cf9efbe98cddfe26d5d3f684
                    • Instruction Fuzzy Hash: B401D4315002149FC338CB29D85CAB23BE5EFCA324F2802ADE156A72A0CB31AC46CF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 780d481f85b05ea53af78a509ab9fed8502fcdb044a441bf3862e33fbfdb507b
                    • Instruction ID: 5b7f7504583a3ea3ab11030f7cf1c40e02ccce767f6ceefdbfdfbbaa4c0fe4e1
                    • Opcode Fuzzy Hash: 780d481f85b05ea53af78a509ab9fed8502fcdb044a441bf3862e33fbfdb507b
                    • Instruction Fuzzy Hash: B0C12A75A0021AEFDB15CF94C894BAEB7B5FF48704F209598E505EB291D731EE81CB90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Variant$ClearInitInitializeUninitialize
                    • String ID:
                    • API String ID: 1998397398-0
                    • Opcode ID: de289d0488ed8cf863ebc19f08b80cfd6679671d5f8c645c6f929f55fd585da8
                    • Instruction ID: 249d2a2c0365079fb271f334b07bceb9bf96534aaf82d69c85deaa61abc59379
                    • Opcode Fuzzy Hash: de289d0488ed8cf863ebc19f08b80cfd6679671d5f8c645c6f929f55fd585da8
                    • Instruction Fuzzy Hash: 54A14D756043109FC700EF24D885A6AB7E5FF89714F148859F98AAB3A2DB34ED41CFA1
                    APIs
                    • ProgIDFromCLSID.OLE32(?,00000000), ref: 00E005F0
                    • CoTaskMemFree.OLE32(00000000), ref: 00E00608
                    • CLSIDFromProgID.OLE32(?,?), ref: 00E0062D
                    • _memcmp.LIBVCRUNTIME ref: 00E0064E
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FromProg$FreeTask_memcmp
                    • String ID:
                    • API String ID: 314563124-0
                    • Opcode ID: c6ecce1c4b2bf3450c2d325932e8554a710c57517dc392297fca9c5e17317e7d
                    • Instruction ID: 0fe143627f35ce85ffe0ea04b6322bc1f2bda21f4cfc41c4bcb577adf301ccd3
                    • Opcode Fuzzy Hash: c6ecce1c4b2bf3450c2d325932e8554a710c57517dc392297fca9c5e17317e7d
                    • Instruction Fuzzy Hash: 9C811B75A00109EFCB04DF94C988EEEB7B9FF89315F204558E516BB290DB71AE46CB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 67e26229a0c82b59ad368943e1379e7ba56639139ff6d897b6f28a964029b933
                    • Instruction ID: 0cb81ae445897061d6fccf6c06385b1e3d06df871e7df8b26f53eb18f6f73dfd
                    • Opcode Fuzzy Hash: 67e26229a0c82b59ad368943e1379e7ba56639139ff6d897b6f28a964029b933
                    • Instruction Fuzzy Hash: 6A412939700691ABDB217BFA9C45FBE7AE5EF41330F28422AF419D73D2E63488419671
                    APIs
                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00E21AFD
                    • WSAGetLastError.WSOCK32 ref: 00E21B0B
                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E21B8A
                    • WSAGetLastError.WSOCK32 ref: 00E21B94
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorLast$socket
                    • String ID:
                    • API String ID: 1881357543-0
                    • Opcode ID: 18df843e2bbdd8cd2dc149abc615e7fec2134e5a939f99717c964bd645e0bfe9
                    • Instruction ID: 836b840f30e39d8fcd4f6498fe34e323a3ba3efe21e18230b07daeb43c6e2834
                    • Opcode Fuzzy Hash: 18df843e2bbdd8cd2dc149abc615e7fec2134e5a939f99717c964bd645e0bfe9
                    • Instruction Fuzzy Hash: 5741B334600210AFE720AF24D886F667BE5EF45718F548498F91AAF3D3D772ED418BA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 000ee2c6c46ac30dc2fb41dc3d6ce2be32c305e212ca9b4af1f8e4439bc7d957
                    • Instruction ID: 2787df88f22a92946db98a812ce94828ff83e3d43299f745b6a79d57585ab1b9
                    • Opcode Fuzzy Hash: 000ee2c6c46ac30dc2fb41dc3d6ce2be32c305e212ca9b4af1f8e4439bc7d957
                    • Instruction Fuzzy Hash: DC41D175A00744EFD724EF78C841BAABBA9EB88728F11452FF141DB382D771990187B0
                    APIs
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E15783
                    • GetLastError.KERNEL32(?,00000000), ref: 00E157A9
                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E157CE
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E157FA
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateHardLink$DeleteErrorFileLast
                    • String ID:
                    • API String ID: 3321077145-0
                    • Opcode ID: 495fb00b339d13040e42798ac947c341d5b404c295c14ae7714774c1bef3fa5c
                    • Instruction ID: f8c89f485393a071b5df2829127b5cbb8afe4352ac50ad29c2a7f8eb64d9e55e
                    • Opcode Fuzzy Hash: 495fb00b339d13040e42798ac947c341d5b404c295c14ae7714774c1bef3fa5c
                    • Instruction Fuzzy Hash: 40411035600610DFCB11EF15C545A5EBBE2EF89724F19C498E84A6B3A2CB34FD41CBA1
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00DC6D71,00000000,00000000,00DC82D9,?,00DC82D9,?,00000001,00DC6D71,8BE85006,00000001,00DC82D9,00DC82D9), ref: 00DDD910
                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DDD999
                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00DDD9AB
                    • __freea.LIBCMT ref: 00DDD9B4
                      • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                    • String ID:
                    • API String ID: 2652629310-0
                    • Opcode ID: 66fc340948b8d2ea8ae53800c4b7a27e0cc527ccc3e83c59d357e210777dfc50
                    • Instruction ID: 32e6d9dcf68710e9d843c7422f67944da97404f0358ee2e8726293b5511961e1
                    • Opcode Fuzzy Hash: 66fc340948b8d2ea8ae53800c4b7a27e0cc527ccc3e83c59d357e210777dfc50
                    • Instruction Fuzzy Hash: 8731D072A0020AABDF249F65DC95EAE7BA6EB40310F190169FC04E7250EB36DD54CBB0
                    APIs
                    • GetKeyboardState.USER32(?), ref: 00E0ABF1
                    • SetKeyboardState.USER32(00000080), ref: 00E0AC0D
                    • PostMessageW.USER32 ref: 00E0AC74
                    • SendInput.USER32(00000001,?,0000001C), ref: 00E0ACC6
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: f111c531450d3b721f76957ebb98d3ecc291834ccbcedb83af58e303fa14e1e9
                    • Instruction ID: 8d1a0a84cab9d41b560381e4dd91d7737e982c6c2302b16f86576e434d352d95
                    • Opcode Fuzzy Hash: f111c531450d3b721f76957ebb98d3ecc291834ccbcedb83af58e303fa14e1e9
                    • Instruction Fuzzy Hash: 95311630A0471CAFFB35CB658C497FEBAA5AB49314F0D622AE485761D1C37489C58752
                    APIs
                    • GetForegroundWindow.USER32 ref: 00E316EB
                      • Part of subcall function 00E03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E03A57
                      • Part of subcall function 00E03A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00E025B3), ref: 00E03A5E
                      • Part of subcall function 00E03A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00E03A65
                    • GetCaretPos.USER32(?), ref: 00E316FF
                    • ClientToScreen.USER32(00000000,?), ref: 00E3174C
                    • GetForegroundWindow.USER32 ref: 00E31752
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                    • String ID:
                    • API String ID: 2759813231-0
                    • Opcode ID: 7a3055643f9844cd7a34955ef8d91053dfa2fd7604b76872cf3f4a97cc393639
                    • Instruction ID: d140798a548adf1ef353b947a100c07da24e23c7c0af24b268e0554b9248a128
                    • Opcode Fuzzy Hash: 7a3055643f9844cd7a34955ef8d91053dfa2fd7604b76872cf3f4a97cc393639
                    • Instruction Fuzzy Hash: B9313071D00149AFC700DFA9C885CAEBBF9EF89304B5480AAE415E7251D631DE45CBA0
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00E0D501
                    • Process32FirstW.KERNEL32(00000000,?), ref: 00E0D50F
                    • Process32NextW.KERNEL32(00000000,?), ref: 00E0D52F
                    • CloseHandle.KERNEL32(00000000), ref: 00E0D5DC
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                    • String ID:
                    • API String ID: 420147892-0
                    • Opcode ID: 73594d85816b14d9e2ee8d437dbf74d2a44287ad7302105195ed1b094f543dbe
                    • Instruction ID: 2d7ed03e4ddf357ca05d561f7041302031214700b0ef41ced37bda32fe19c761
                    • Opcode Fuzzy Hash: 73594d85816b14d9e2ee8d437dbf74d2a44287ad7302105195ed1b094f543dbe
                    • Instruction Fuzzy Hash: 633170711082009FD300EF64CC95AAFBBF8EF9A354F14052DF581A61A1EB71D989CBA2
                    APIs
                    • GetFileAttributesW.KERNEL32(?,00E3CB68), ref: 00E0D2FB
                    • GetLastError.KERNEL32 ref: 00E0D30A
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E0D319
                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E3CB68), ref: 00E0D376
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateDirectory$AttributesErrorFileLast
                    • String ID:
                    • API String ID: 2267087916-0
                    • Opcode ID: 9a36f0f2103d63d61c54350df92006cf643fbfd50b3eab037e4f72bb85128a82
                    • Instruction ID: 2a4fe763f1adc48c67229b1c51cf8e14e082cf94f3d74683894b8965635acdca
                    • Opcode Fuzzy Hash: 9a36f0f2103d63d61c54350df92006cf643fbfd50b3eab037e4f72bb85128a82
                    • Instruction Fuzzy Hash: 08217E705083019FC700DF68C8854AABBE4EF56768F205A19F499E32E1D734D98ACBA3
                    APIs
                      • Part of subcall function 00E01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E0102A
                      • Part of subcall function 00E01014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E01036
                      • Part of subcall function 00E01014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01045
                      • Part of subcall function 00E01014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E0104C
                      • Part of subcall function 00E01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01062
                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E015BE
                    • _memcmp.LIBVCRUNTIME ref: 00E015E1
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E01617
                    • HeapFree.KERNEL32(00000000), ref: 00E0161E
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                    • String ID:
                    • API String ID: 1592001646-0
                    • Opcode ID: 7fa4cb380dd663cd7eea346b0dd3c8489f3e3a08b63a8f112d42d955c4b9b7bb
                    • Instruction ID: c3b9a637ea2562fc1722c72794374b139dc97db9c073cb53b6045dbe53114942
                    • Opcode Fuzzy Hash: 7fa4cb380dd663cd7eea346b0dd3c8489f3e3a08b63a8f112d42d955c4b9b7bb
                    • Instruction Fuzzy Hash: 68217A31E00109AFDB14DFA4DD49BEEB7B8EF44348F184499E441BB281E731AA85DBA0
                    APIs
                    • GetWindowLongW.USER32(?,000000EC), ref: 00E3280A
                    • SetWindowLongW.USER32 ref: 00E32824
                    • SetWindowLongW.USER32 ref: 00E32832
                    • SetLayeredWindowAttributes.USER32 ref: 00E32840
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Long$AttributesLayered
                    • String ID:
                    • API String ID: 2169480361-0
                    • Opcode ID: f82e1be613ddd38fd6c618994dc8703317ccbe5ded870f4dbbf362104592cf70
                    • Instruction ID: 30dbdf21cb49324033234d240c7599a4b1798d560d07b398cb733e471c69a5fc
                    • Opcode Fuzzy Hash: f82e1be613ddd38fd6c618994dc8703317ccbe5ded870f4dbbf362104592cf70
                    • Instruction Fuzzy Hash: 4821F131604110AFD7149B24C848FAA7F95EF85324F24815DF566AB2E2C771FC42C7A0
                    APIs
                      • Part of subcall function 00E08D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00E0790A,?,000000FF,?,00E08754,00000000,?,0000001C,?,?), ref: 00E08D8C
                      • Part of subcall function 00E08D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00E08DB2
                      • Part of subcall function 00E08D7D: lstrcmpiW.KERNEL32(00000000,?,00E0790A,?,000000FF,?,00E08754,00000000,?,0000001C,?,?), ref: 00E08DE3
                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00E08754,00000000,?,0000001C,?,?,00000000), ref: 00E07923
                    • lstrcpyW.KERNEL32(00000000,?), ref: 00E07949
                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E08754,00000000,?,0000001C,?,?,00000000), ref: 00E07984
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: lstrcmpilstrcpylstrlen
                    • String ID: cdecl
                    • API String ID: 4031866154-3896280584
                    • Opcode ID: 2eb702447f830d4b87180ea9493f6471041e83d44b3aa5e47bc40b74237d54fb
                    • Instruction ID: a422009ecfb358af8926a54ef6d3e2a907a7990b09892a7f03295a472a81f435
                    • Opcode Fuzzy Hash: 2eb702447f830d4b87180ea9493f6471041e83d44b3aa5e47bc40b74237d54fb
                    • Instruction Fuzzy Hash: 8711263A200302AFCB159F39DC45D7A77E9FF85394B50502AF982D72A4EB31E851D7A1
                    APIs
                    • GetWindowLongW.USER32(?,000000F0), ref: 00E37D0B
                    • SetWindowLongW.USER32 ref: 00E37D2A
                    • SetWindowLongW.USER32 ref: 00E37D42
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00E37D6B
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$Long
                    • String ID:
                    • API String ID: 847901565-0
                    • Opcode ID: 87ef612f9efd9a18b18be307bfb052664d33a59847823be8e6e8f09228562873
                    • Instruction ID: f35119618bbf367a6cd589af97f3f6de235445864c8633ca1403b5b867b6efc3
                    • Opcode Fuzzy Hash: 87ef612f9efd9a18b18be307bfb052664d33a59847823be8e6e8f09228562873
                    • Instruction Fuzzy Hash: 8311DF72204658AFCB208F29CC08AA63FA4AF86364F619324F979F72F0D731C951DB50
                    APIs
                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 00E356BB
                    • _wcslen.LIBCMT ref: 00E356CD
                    • _wcslen.LIBCMT ref: 00E356D8
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E35816
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend_wcslen
                    • String ID:
                    • API String ID: 455545452-0
                    • Opcode ID: fad4db8c03fabb168fd488fbdc464556b6d6d08d4b78787d7dd98afc9077e368
                    • Instruction ID: 7238f918924abbb5bc3e819d9fac5d951165b512f2ebe614c6ceaf419921d813
                    • Opcode Fuzzy Hash: fad4db8c03fabb168fd488fbdc464556b6d6d08d4b78787d7dd98afc9077e368
                    • Instruction Fuzzy Hash: D711067260061896DB20DF65CC89AFE3FACEF01764F10506AF916F6281EB70CA84CF61
                    APIs
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00E01A47
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E01A59
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E01A6F
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E01A8A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 0dbf221e9f943609986b356497a295565a4b8a5b1e2e9d74e0f34a53f777efdd
                    • Instruction ID: d1c641b805278a0215c4ce830d7efb789f5c77efa5e65f845472e8a41fcd6297
                    • Opcode Fuzzy Hash: 0dbf221e9f943609986b356497a295565a4b8a5b1e2e9d74e0f34a53f777efdd
                    • Instruction Fuzzy Hash: DF11FA3AA01219FFEB119BA5CD85FADBB78EB04754F200091E604B7290D6716E50DB94
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 00E0E1FD
                    • MessageBoxW.USER32 ref: 00E0E230
                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E0E246
                    • CloseHandle.KERNEL32(00000000), ref: 00E0E24D
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                    • String ID:
                    • API String ID: 2880819207-0
                    • Opcode ID: 7d5a65e4ca6009ab1024005917ffa48905ee5b741bd749943a44fe8510e62e5e
                    • Instruction ID: 611a4ff86c4babe2ce66de9925e7e93dde851cba3cbc8add3e4f64eb5cb36dc0
                    • Opcode Fuzzy Hash: 7d5a65e4ca6009ab1024005917ffa48905ee5b741bd749943a44fe8510e62e5e
                    • Instruction Fuzzy Hash: E011E572904318BFC701DBA9AC09A9A7FAC9B45314F1146A9F814F3391D270C94887A0
                    APIs
                    • CreateThread.KERNEL32(00000000,?,00DCCFF9,00000000,00000004,00000000), ref: 00DCD218
                    • GetLastError.KERNEL32 ref: 00DCD224
                    • __dosmaperr.LIBCMT ref: 00DCD22B
                    • ResumeThread.KERNEL32(00000000), ref: 00DCD249
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                    • String ID:
                    • API String ID: 173952441-0
                    • Opcode ID: e767b97bd15239a73e6190a7279d01c08e6f0699455d779bad26fedd02da584f
                    • Instruction ID: 9874d9f1bc8c8aacba3343ab7bb4c2a9734a2ccb687c61de9c1e6381fd5187bb
                    • Opcode Fuzzy Hash: e767b97bd15239a73e6190a7279d01c08e6f0699455d779bad26fedd02da584f
                    • Instruction Fuzzy Hash: C501D67640520A7FC7115BA5DC09FAABA6EDF81730F24022DF925A71D0CB70C905D7B0
                    APIs
                    • CreateWindowExW.USER32 ref: 00DA604C
                    • GetStockObject.GDI32(00000011), ref: 00DA6060
                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA606A
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateMessageObjectSendStockWindow
                    • String ID:
                    • API String ID: 3970641297-0
                    • Opcode ID: 56b86abc938ae293d22091c936f632dc49141e5d62cc730683d83a906b4f783d
                    • Instruction ID: 42a99eb6678b1878b65f9fc673dd060126b25170492fbf00ec9464ae2d9442af
                    • Opcode Fuzzy Hash: 56b86abc938ae293d22091c936f632dc49141e5d62cc730683d83a906b4f783d
                    • Instruction Fuzzy Hash: 2611A172101508FFEF124FA59C44EEA7F69EF09354F180106FA1462010C732DCA0DBA0
                    APIs
                    • ___BuildCatchObject.LIBVCRUNTIME ref: 00DC3B56
                      • Part of subcall function 00DC3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00DC3AD2
                      • Part of subcall function 00DC3AA3: ___AdjustPointer.LIBCMT ref: 00DC3AED
                    • _UnwindNestedFrames.LIBCMT ref: 00DC3B6B
                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00DC3B7C
                    • CallCatchBlock.LIBVCRUNTIME ref: 00DC3BA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                    • String ID:
                    • API String ID: 737400349-0
                    • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                    • Instruction ID: 826a2a38832371434e43d63f92d28643513e5eaaab500a9b114ea54061717a8e
                    • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                    • Instruction Fuzzy Hash: FD01D73210014ABBDF125E95CC46EEB7B6EEF58754F048018FE4897121C632E961ABB0
                    APIs
                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00E0747F
                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00E07497
                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00E074AC
                    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00E074CA
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Type$Register$FileLoadModuleNameUser
                    • String ID:
                    • API String ID: 1352324309-0
                    • Opcode ID: f8e03fe767d189af9dc61ebf1110eba5f5264a73807d1d5e809b6da89c90bf94
                    • Instruction ID: 59224724d7a42d4c8db3ce3f829b2b7020472c30ad268bc604f35f74ee6d3a09
                    • Opcode Fuzzy Hash: f8e03fe767d189af9dc61ebf1110eba5f5264a73807d1d5e809b6da89c90bf94
                    • Instruction Fuzzy Hash: AF1161B5A053159FE7208F15DC09B927FFCEB00B04F109569A6A6F6191D7B0F948DB60
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B0C4
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B0E9
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B0F3
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B126
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuerySleep
                    • String ID:
                    • API String ID: 2875609808-0
                    • Opcode ID: 664f290ea274e0f9a4f868e49633f892885dd0ec715241b62c80f7d60e45875a
                    • Instruction ID: fdb215b51275d008947692e5cdfb96745b656a4efccfcd331440adc31874c59b
                    • Opcode Fuzzy Hash: 664f290ea274e0f9a4f868e49633f892885dd0ec715241b62c80f7d60e45875a
                    • Instruction Fuzzy Hash: 66116131C0252CDBCF049FE5E9586EEBF78FF19711F105085D941B3181CB3095949B51
                    APIs
                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E02DC5
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E02DD6
                    • GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000), ref: 00E02DDD
                    • AttachThreadInput.USER32(00000000,?,00000000), ref: 00E02DE4
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                    • String ID:
                    • API String ID: 2710830443-0
                    • Opcode ID: 08ad649302ac34ef132221c173829aa013bbb5a9595cdeb2290e88bdef7f31ae
                    • Instruction ID: 35adc490583e5ab808c8c66d637d1beae160102cfd483176a2f94d7f8c840a7b
                    • Opcode Fuzzy Hash: 08ad649302ac34ef132221c173829aa013bbb5a9595cdeb2290e88bdef7f31ae
                    • Instruction Fuzzy Hash: 45E06D711012287BDB201B639C0EEEB3EACEB42FA1F101019B206F10809AA1C884C7B0
                    APIs
                      • Part of subcall function 00DB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00DB9693
                      • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96A2
                      • Part of subcall function 00DB9639: BeginPath.GDI32(?), ref: 00DB96B9
                      • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96E2
                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00E38887
                    • LineTo.GDI32(?,?,?), ref: 00E38894
                    • EndPath.GDI32(?), ref: 00E388A4
                    • StrokePath.GDI32(?), ref: 00E388B2
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                    • String ID:
                    • API String ID: 1539411459-0
                    • Opcode ID: a614d52f7d9e167440710394ae7c1abdae5517ac85cf10b07a0b1fafe6acf135
                    • Instruction ID: 8c9f269fa24fbf0218b1912ccc5c443a40d58eb51ade3a18bbd86f8e1c5d4f8b
                    • Opcode Fuzzy Hash: a614d52f7d9e167440710394ae7c1abdae5517ac85cf10b07a0b1fafe6acf135
                    • Instruction Fuzzy Hash: 75F09A36001298FADB125F99AC0DFCA3F29AF46310F508000FB02750E2C7748555CFA5
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Color$ModeObjectStockText
                    • String ID:
                    • API String ID: 4037423528-0
                    • Opcode ID: eb74321b567b0db36cd2f374bad5ddb23458d6c67974270db71aa383bc780b45
                    • Instruction ID: 0f8552593cfe7f54a8f6792313190753e4039c5e2586ac86c310bcce9ed45253
                    • Opcode Fuzzy Hash: eb74321b567b0db36cd2f374bad5ddb23458d6c67974270db71aa383bc780b45
                    • Instruction Fuzzy Hash: 8BE06531244288AEDF215B75AC0DBE83F21AB11335F18C219F7FA740E1C37186449B20
                    APIs
                    • GetCurrentThread.KERNEL32(00000028,00000000,?,00000000,00E01089,?,?,?,00E011D9), ref: 00E01634
                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00E011D9), ref: 00E0163B
                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00E011D9), ref: 00E01648
                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00E011D9), ref: 00E0164F
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CurrentOpenProcessThreadToken
                    • String ID:
                    • API String ID: 3974789173-0
                    • Opcode ID: 8028fbc908995ebefd345b7fda9f2bfb753c894825fb2f2a01cf53b8cbac43d0
                    • Instruction ID: e41682bfc199fcf52914b21479848d344052e5229681cc181d2994cf7c1237d5
                    • Opcode Fuzzy Hash: 8028fbc908995ebefd345b7fda9f2bfb753c894825fb2f2a01cf53b8cbac43d0
                    • Instruction Fuzzy Hash: DEE04632602215AFD7201BA2AE0DB863F78AF44796F248848F245F9090E624C4898B60
                    APIs
                    • GetDesktopWindow.USER32 ref: 00DFD858
                    • GetDC.USER32(00000000), ref: 00DFD862
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DFD882
                    • ReleaseDC.USER32(?), ref: 00DFD8A3
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: 92635837dc7d2e4f5c8963f6dac547f0fca392ecf74e4f7b1dd4aac98f477529
                    • Instruction ID: 9721e67bb94a4108a7a6650d5e70bf593df2583157b32c0310d1de3600ea4dac
                    • Opcode Fuzzy Hash: 92635837dc7d2e4f5c8963f6dac547f0fca392ecf74e4f7b1dd4aac98f477529
                    • Instruction Fuzzy Hash: 0DE01AB1800208DFCB41AFA1D80D66DBFB2FB08710F208409F846F7260C738C906AF60
                    APIs
                    • GetDesktopWindow.USER32 ref: 00DFD86C
                    • GetDC.USER32(00000000), ref: 00DFD876
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DFD882
                    • ReleaseDC.USER32(?), ref: 00DFD8A3
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: 3ae68ed376fa1d4d88d32e6004a257eb0beef86a40e77ecf4ac22f785ef81038
                    • Instruction ID: 3f8e5fc8ef314657cb8ece6f9929913c9044a42c8bbb3635c6e6b164dfee2bb6
                    • Opcode Fuzzy Hash: 3ae68ed376fa1d4d88d32e6004a257eb0beef86a40e77ecf4ac22f785ef81038
                    • Instruction Fuzzy Hash: 31E01A71800208DFCB40AFA1D80D66DBFB1FB08710F208408F846F7260C73899069F50
                    APIs
                      • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00E14ED4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Connection_wcslen
                    • String ID: *$LPT
                    • API String ID: 1725874428-3443410124
                    • Opcode ID: d339064b2972e64ad4ee76485a6edc25347386fee655ec532955eef01fb1d9a2
                    • Instruction ID: 765e51ea637fb8348ca5b57af1d6cd6983c67d7a33a0f208239dc5cbd310583f
                    • Opcode Fuzzy Hash: d339064b2972e64ad4ee76485a6edc25347386fee655ec532955eef01fb1d9a2
                    • Instruction Fuzzy Hash: B89140B5A002049FCB14DF54C484EE9BBF5EF49318F199099E4066F392D731ED86CB61
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 00DCE30D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ErrorHandling__start
                    • String ID: pow
                    • API String ID: 3213639722-2276729525
                    • Opcode ID: b3eab3a632270696b9c94858cef0c59d1f0891036ceac836a3b49d53117c93f0
                    • Instruction ID: bd45df713a731b28344e846a01a3f734322b8c3e64b2b0f689c0319fe63ed5de
                    • Opcode Fuzzy Hash: b3eab3a632270696b9c94858cef0c59d1f0891036ceac836a3b49d53117c93f0
                    • Instruction Fuzzy Hash: BD513BA1A0C203DACB157714C901B796B94EB40741F684DDEF0D5933A9FB34CC969A76
                    APIs
                    • CharUpperBuffW.USER32(00DF569E,00000000), ref: 00E278DD
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                    • CharUpperBuffW.USER32(00DF569E,00000000), ref: 00E2783B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: BuffCharUpper$_wcslen
                    • String ID: <s
                    • API String ID: 3544283678-2940880691
                    • Opcode ID: 1f83f7920ab21e710fc0118660f730baab8bec1ea79a6656fd7d025ee2d93905
                    • Instruction ID: 29233f576acd83f91d21b27e19517a4b36e84322e55297a10509a9ef6299f7b2
                    • Opcode Fuzzy Hash: 1f83f7920ab21e710fc0118660f730baab8bec1ea79a6656fd7d025ee2d93905
                    • Instruction Fuzzy Hash: E8614A32914228EACF04EBA4DC91DFDB374FF55304B546129E582B7191EF24AA49CBB0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: #
                    • API String ID: 0-1885708031
                    • Opcode ID: 6a208ef16a588f67832febbeb231e8b5c0594ebea290b9ed92f8be6cac7600dc
                    • Instruction ID: 8859413911fe2600e5127591295fa0742e67adc8da864594554a88eea8ee9b74
                    • Opcode Fuzzy Hash: 6a208ef16a588f67832febbeb231e8b5c0594ebea290b9ed92f8be6cac7600dc
                    • Instruction Fuzzy Hash: 2D51233550425ADFDB19EF28C481AFE7BA5EF56310F288065E9929B2E0D734DD42CBB0
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00DBF2A2
                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00DBF2BB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: GlobalMemorySleepStatus
                    • String ID: @
                    • API String ID: 2783356886-2766056989
                    • Opcode ID: bec69cd53e977925e2d21fa9815590596e112a07ec2e56cab6428b255c270897
                    • Instruction ID: 2fbd9d94d47b0eb8a0e6a68d6d84f7c410cd2c661d61604f8bb738aeafe86620
                    • Opcode Fuzzy Hash: bec69cd53e977925e2d21fa9815590596e112a07ec2e56cab6428b255c270897
                    • Instruction Fuzzy Hash: C55132724187889FD320AF11DC86BABBBF8FF85310F81885DF199511A5EB7085298B66
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: BuffCharUpper_wcslen
                    • String ID: CALLARGARRAY
                    • API String ID: 157775604-1150593374
                    • Opcode ID: 13ae68d3e980a0e1e266cbca22232e1dbd7e682f6fede19ad0a7b7ee3a0364f4
                    • Instruction ID: a87c38a1a966117e37fb0ec720d582da9d490512bb79c7a63512760c04c50430
                    • Opcode Fuzzy Hash: 13ae68d3e980a0e1e266cbca22232e1dbd7e682f6fede19ad0a7b7ee3a0364f4
                    • Instruction Fuzzy Hash: 76418E32E002199FCB08DFA8D9869FEBBF5EF59324F145029E505B7291D7749D81CBA0
                    APIs
                    • _wcslen.LIBCMT ref: 00E1D130
                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E1D13A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CrackInternet_wcslen
                    • String ID: |
                    • API String ID: 596671847-2343686810
                    • Opcode ID: 2697da73173091b5c871b73c32c0cb4fc33683d637cd78bd0988d23ec3b6f632
                    • Instruction ID: 6b372c969d94efd3b9e04bafa93088c277c4ed71aafa769b850ceb83d1877841
                    • Opcode Fuzzy Hash: 2697da73173091b5c871b73c32c0cb4fc33683d637cd78bd0988d23ec3b6f632
                    • Instruction Fuzzy Hash: 92312A72D01219ABCF15EFA4CC85AEEBFB9FF05304F104019F815B6166EB35AA46CB60
                    APIs
                    • DestroyWindow.USER32 ref: 00E33621
                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00E3365C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$DestroyMove
                    • String ID: static
                    • API String ID: 2139405536-2160076837
                    • Opcode ID: 3ae39503fb4aa9ef3b91ef25f8ecb2715e9c4fef0eab87d7dd4243dc5d8e3e92
                    • Instruction ID: cf945a2d4510c73630e4673fde44faba0464509f2facf20a340bfea943cdbebf
                    • Opcode Fuzzy Hash: 3ae39503fb4aa9ef3b91ef25f8ecb2715e9c4fef0eab87d7dd4243dc5d8e3e92
                    • Instruction Fuzzy Hash: D4317C71110204AEDB24DF38DC45EBB77A9FF88724F10A619F9A5A7290DA31E991C760
                    APIs
                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DE33A2
                      • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DA3A04
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: IconLoadNotifyShell_String_wcslen
                    • String ID: Line:
                    • API String ID: 2289894680-1585850449
                    • Opcode ID: 12ba793daf1e342df321d89a36ba141d378c43f99fcf9e113bd7ba6e211d92c6
                    • Instruction ID: e793997d16ef32db6905c64c05e671124d0e067e5b6df8bb3e5242c16c4e4258
                    • Opcode Fuzzy Hash: 12ba793daf1e342df321d89a36ba141d378c43f99fcf9e113bd7ba6e211d92c6
                    • Instruction Fuzzy Hash: 2131B071408304AEC721EB24DC46BEBB7E8EB42710F14456AF599A3091EB70D648CBF2
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                      • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                    • GetParent.USER32(?), ref: 00DF73A3
                    • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 00DF742D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LongWindow$ParentProc
                    • String ID: Hiy
                    • API String ID: 2181805148-472783900
                    • Opcode ID: 85db1d13ec823e7c6d1e6b26abb30a48f769ff39bec97dcfa477767d6035e0d1
                    • Instruction ID: c2c1e6823f8a8b9aee06e0e76cc5518630f82fbb2b590df907cf8dac688534c9
                    • Opcode Fuzzy Hash: 85db1d13ec823e7c6d1e6b26abb30a48f769ff39bec97dcfa477767d6035e0d1
                    • Instruction Fuzzy Hash: DD21DD34600248EFCB259F29C869DF93BE5EF4A360F198255FB265B2A1C3308D51EB70
                    APIs
                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E3327C
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E33287
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Combobox
                    • API String ID: 3850602802-2096851135
                    • Opcode ID: cb186efecfdb87492124536a8dcbcadfb09eae93a4a6b42ef5d9120aa1224679
                    • Instruction ID: 2d29dcf9ba481c0fa6dcfe958f3ef9775d54b1f4bb854382e219317a751e9268
                    • Opcode Fuzzy Hash: cb186efecfdb87492124536a8dcbcadfb09eae93a4a6b42ef5d9120aa1224679
                    • Instruction Fuzzy Hash: 851193713002086FEF259E64DC89EBB3B5AEB54368F105628F518B72A1D6719D51C760
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CreateMenuPopup
                    • String ID: Hiy
                    • API String ID: 3826294624-472783900
                    • Opcode ID: d66b88835c5129e47a726e692cdc8121fd40144fead4939d53215565e79d6041
                    • Instruction ID: d7b3e4644d6ecd0a9aaaf674738f3dbe869770a185389e02e32894e7df19f242
                    • Opcode Fuzzy Hash: d66b88835c5129e47a726e692cdc8121fd40144fead4939d53215565e79d6041
                    • Instruction Fuzzy Hash: A72160346042049FCB10CF29C449FD67BE5FB8A368F15905AE899AB361D331ED42DF51
                    APIs
                      • Part of subcall function 00DA600E: CreateWindowExW.USER32 ref: 00DA604C
                      • Part of subcall function 00DA600E: GetStockObject.GDI32(00000011), ref: 00DA6060
                      • Part of subcall function 00DA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA606A
                    • GetWindowRect.USER32(00000000,?), ref: 00E3377A
                    • GetSysColor.USER32 ref: 00E33794
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                    • String ID: static
                    • API String ID: 1983116058-2160076837
                    • Opcode ID: 28e45d39bf1d238c1bd1a246d51122137a1afb6fdac578e0843316fb0096cb46
                    • Instruction ID: 1ac92a3e525ad43f2f126ef4a79a5771218b868a802c4b83a0304b339d0690e3
                    • Opcode Fuzzy Hash: 28e45d39bf1d238c1bd1a246d51122137a1afb6fdac578e0843316fb0096cb46
                    • Instruction Fuzzy Hash: 941126B2610209AFDF00DFB8CC4AEEA7BB8EB08314F105925F955E2250E735E865DB60
                    APIs
                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E361FC
                    • SendMessageW.USER32(?,00000194,00000000,00000000), ref: 00E36225
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Hiy
                    • API String ID: 3850602802-472783900
                    • Opcode ID: 82e90288f20b23a7cacef7f6541b837cbd3ec9144cea3d19d1889f2a8705bac2
                    • Instruction ID: 1d3f518eee29412d3bb3fee73c0fdb455e35f9b7ce028742ed89350bb685c71c
                    • Opcode Fuzzy Hash: 82e90288f20b23a7cacef7f6541b837cbd3ec9144cea3d19d1889f2a8705bac2
                    • Instruction Fuzzy Hash: BB117931140218BEEB108F78DC1EFBA3FA4EB0A718F119115FA16BA1A1D2B0DA00DB61
                    APIs
                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E1CD7D
                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E1CDA6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Internet$OpenOption
                    • String ID: <local>
                    • API String ID: 942729171-4266983199
                    • Opcode ID: 3759e68b6aead903a129a66f249df5fbca3968926706af3555e3b86e167d2111
                    • Instruction ID: e685677b423b611faf9a02871e26f6c0a90610aa0146723aeac215a37deed68d
                    • Opcode Fuzzy Hash: 3759e68b6aead903a129a66f249df5fbca3968926706af3555e3b86e167d2111
                    • Instruction Fuzzy Hash: D01106B12816357AD7344B66AC48EE7BE6CEF127A8F206226B109E3080D37098C1D6F0
                    APIs
                    • GetWindowTextLengthW.USER32 ref: 00E334AB
                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E334BA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LengthMessageSendTextWindow
                    • String ID: edit
                    • API String ID: 2978978980-2167791130
                    • Opcode ID: 98199496fcfacefc98f3d04a8764b6516b11a5a9aade17147e25b197e5225651
                    • Instruction ID: 3522a816177f301f0da6c8da83a2ae7a477a9ece948d19069ff055429638de42
                    • Opcode Fuzzy Hash: 98199496fcfacefc98f3d04a8764b6516b11a5a9aade17147e25b197e5225651
                    • Instruction Fuzzy Hash: 12115B71100208AFEB118F749C48EAA3BAAEB05778F616324F975B31E0C671DC95D761
                    APIs
                    • SendMessageW.USER32(?,?,?,?), ref: 00E34FCC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Hiy
                    • API String ID: 3850602802-472783900
                    • Opcode ID: 9c1b133f6b4c1a3f6b8c50bb11d6c9e325e1a101c4cfd8b4322929a031665f29
                    • Instruction ID: fbb1ab5e4ae33b41d1c3f5548dbb5bfb7d3607fed7a9f25cb9e3a8ac08271b91
                    • Opcode Fuzzy Hash: 9c1b133f6b4c1a3f6b8c50bb11d6c9e325e1a101c4cfd8b4322929a031665f29
                    • Instruction Fuzzy Hash: 0221D37A60021AEFCB15CFA8C9448EA7BB6FB4D344B105154FA05A7360D732EA21DBA1
                    APIs
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                    • CharUpperBuffW.USER32(?,?), ref: 00E06CB6
                    • _wcslen.LIBCMT ref: 00E06CC2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen$BuffCharUpper
                    • String ID: STOP
                    • API String ID: 1256254125-2411985666
                    • Opcode ID: c5f2e1997c29c16471b85a5561ced9e6a5a740ef8d69a6dd8f8ec869d7d6274a
                    • Instruction ID: f74b10393a5f56da4332ed1f6375ab8459c227a6989f44a0ec459d7ef356e82a
                    • Opcode Fuzzy Hash: c5f2e1997c29c16471b85a5561ced9e6a5a740ef8d69a6dd8f8ec869d7d6274a
                    • Instruction Fuzzy Hash: 6B01C4327005268BDB20AFFDDC91BBFB7B5EB617147101929E852B71D4EB31D9A0C660
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hiy
                    • API String ID: 0-472783900
                    • Opcode ID: 2b7c192190d4f358f89455e55f30106f4d995d5f824d662dcf4785cee619c3b6
                    • Instruction ID: 0e87cde9a46f8d44e157fdab1b695ba22121e6bfde6d44224a9ddcaa7f77b36b
                    • Opcode Fuzzy Hash: 2b7c192190d4f358f89455e55f30106f4d995d5f824d662dcf4785cee619c3b6
                    • Instruction Fuzzy Hash: 41116D34604604AFCB20DF19D850EA5B7F6FF89320F158259FA699B2A0CB71E985CF90
                    APIs
                      • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                      • Part of subcall function 00E03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E03CCA
                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E01C46
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_wcslen
                    • String ID: ComboBox$ListBox
                    • API String ID: 624084870-1403004172
                    • Opcode ID: dac05482444c9a410848ca5943b59b599af63b1484921dd424de62522794a9ef
                    • Instruction ID: 87c7e3337aec50ce2cda27071b4e68cceb8e5e0704aea8932610a8492031e73d
                    • Opcode Fuzzy Hash: dac05482444c9a410848ca5943b59b599af63b1484921dd424de62522794a9ef
                    • Instruction Fuzzy Hash: 4C01AC7578110467DB18E7A0C9A1AFFF7A8DB12380F141055B406771C1EA24DE988671
                    APIs
                      • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                    • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,00DF769C,?,?,?), ref: 00E39111
                      • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                    • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00E390F7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LongWindow$MessageProcSend
                    • String ID: Hiy
                    • API String ID: 982171247-472783900
                    • Opcode ID: f297af881dfe1d97f01127480dedbb4eb39aaa044930ff56501d7e787d7bd53c
                    • Instruction ID: 7d614c765138d6239086fa9c2571e902de379fe2c95dda58ff8b4b16c7b5fd3f
                    • Opcode Fuzzy Hash: f297af881dfe1d97f01127480dedbb4eb39aaa044930ff56501d7e787d7bd53c
                    • Instruction Fuzzy Hash: D801B131101204AFDB219F19DC5DEA67FA6FF85365F100058FA563A2E2C7B26C45DB61
                    APIs
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E73018,00E7305C), ref: 00E381BF
                    • CloseHandle.KERNEL32 ref: 00E381D1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CloseCreateHandleProcess
                    • String ID: \0
                    • API String ID: 3712363035-3218720685
                    • Opcode ID: 155352378f49430b7a3a945749017f75bb27b4b2daa2805e85fd3b9f4c645b8f
                    • Instruction ID: 41fcd9b17469a81a1511ed78d408f1b05e6b6445192a37312de47b4ad8106f8e
                    • Opcode Fuzzy Hash: 155352378f49430b7a3a945749017f75bb27b4b2daa2805e85fd3b9f4c645b8f
                    • Instruction Fuzzy Hash: 41F082B2640304BEE360A772AC4AFB73E5CDB05750F004464BB4CF61A2D6798E58A3F9
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: _wcslen
                    • String ID: 3, 3, 16, 1
                    • API String ID: 176396367-3042988571
                    • Opcode ID: 3ee96e3fcc175425ccecf3927a702be196db14be2d6cccbd490f92e2228ececf
                    • Instruction ID: 3b61b3cd0a35a9a88f6758368f8ba2d60738f2ca1b421a1464d36ce1533e2559
                    • Opcode Fuzzy Hash: 3ee96e3fcc175425ccecf3927a702be196db14be2d6cccbd490f92e2228ececf
                    • Instruction Fuzzy Hash: 2BE02B026043315092713279BCC1EBF5A89DFC57A4710382FF9D1E3266EEA48D9193B0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Message
                    • String ID: AutoIt$Error allocating memory.
                    • API String ID: 2030045667-4017498283
                    • Opcode ID: 5e9bc0df325d17981b76aa5c8e8c72550d6871bdc15a45799edd6f0b9137c770
                    • Instruction ID: 1280d2dc98e46dfd20ab8920044b4c88d4a314d3cdc3d7755e3e7e8417360555
                    • Opcode Fuzzy Hash: 5e9bc0df325d17981b76aa5c8e8c72550d6871bdc15a45799edd6f0b9137c770
                    • Instruction Fuzzy Hash: C8E04F322843186AD21437957C07FD97E88CF06B65F20146AFB98B55C38AE2A59087B9
                    APIs
                      • Part of subcall function 00DBF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00DC0D71,?,?,?,00DA100A), ref: 00DBF7CE
                    • IsDebuggerPresent.KERNEL32(?,?,?,00DA100A), ref: 00DC0D75
                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00DA100A), ref: 00DC0D84
                    Strings
                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00DC0D7F
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                    • API String ID: 55579361-631824599
                    • Opcode ID: d094ff791877e081451b36af3d0127486442859169ea5680eabbe9ca1c790e3a
                    • Instruction ID: da51ae4d2f0eddcbb060dcb57495a70b5ef3b6312ba452f08f17e4335d5736fe
                    • Opcode Fuzzy Hash: d094ff791877e081451b36af3d0127486442859169ea5680eabbe9ca1c790e3a
                    • Instruction Fuzzy Hash: 8EE039702007128FD3209FAAD8087427FE0AB00741F048A6DE887E7A61DBB4E4498BB1
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 00DBE3D5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: Init_thread_footer
                    • String ID: 0%$8%
                    • API String ID: 1385522511-2949748613
                    • Opcode ID: f9b88c625c4f2e6f77664a54cb3a417c14a6e4e24c07670af4b8af4f88922879
                    • Instruction ID: ed7a61a8c6a4a964a8a2137be7d62514e8730360d45fa766875290c75eecab09
                    • Opcode Fuzzy Hash: f9b88c625c4f2e6f77664a54cb3a417c14a6e4e24c07670af4b8af4f88922879
                    • Instruction Fuzzy Hash: 92E02631400A10CFC604E72AB855EC83391EB49329B14E16CE30BA72D39B30A881877A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: LocalTime
                    • String ID: %.3d$X64
                    • API String ID: 481472006-1077770165
                    • Opcode ID: 252fccbc31fc0d63322202faacaecc19b973e37bc3e054c0cde1fbf279b09029
                    • Instruction ID: de6f776b0e3ea8e3b8141a49bb86acb5c077aa3f2e4b5441dbc250c0cf9757ed
                    • Opcode Fuzzy Hash: 252fccbc31fc0d63322202faacaecc19b973e37bc3e054c0cde1fbf279b09029
                    • Instruction Fuzzy Hash: 93D0126184810CE9CB5097D0DC498FAB77EEB09341F61C452FA87A1040E634C50867B5
                    APIs
                    • FindWindowW.USER32 ref: 00E3236C
                    • PostMessageW.USER32 ref: 00E32373
                      • Part of subcall function 00E0E97B: Sleep.KERNEL32 ref: 00E0E9F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FindMessagePostSleepWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 529655941-2988720461
                    • Opcode ID: 185e42465629573856d2110fe374bbd2271db23848907742d24c71e2d7a6fe5a
                    • Instruction ID: 975cf1803af7c6e4c72a831a03e680aa83231cf8b52798136394bacda2d32b36
                    • Opcode Fuzzy Hash: 185e42465629573856d2110fe374bbd2271db23848907742d24c71e2d7a6fe5a
                    • Instruction Fuzzy Hash: AAD0A9323C03007BE264A331AC0FFC67A049B40B00F1009127241BA1E0C8A0B8048B04
                    APIs
                    • FindWindowW.USER32 ref: 00E3232C
                    • PostMessageW.USER32 ref: 00E3233F
                      • Part of subcall function 00E0E97B: Sleep.KERNEL32 ref: 00E0E9F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.355252817.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                    • Associated: 00000000.00000002.355248799.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355281000.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355292869.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.355296137.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_da0000_New order.jbxd
                    Similarity
                    • API ID: FindMessagePostSleepWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 529655941-2988720461
                    • Opcode ID: c330ed73c8e05f275dfda69ecab1f03779efe685a907c1ef4d1fb90b5ac694a7
                    • Instruction ID: 2264cb500823642d04c6d678edd1d1dec68beb36cc77584c6d2efb5a82d3d29a
                    • Opcode Fuzzy Hash: c330ed73c8e05f275dfda69ecab1f03779efe685a907c1ef4d1fb90b5ac694a7
                    • Instruction Fuzzy Hash: 06D0C936394314BBE664A771AC0FFC67A549B50B10F1059167645BA1E0C9A0A8458B54