Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
shipping documents.exe

Overview

General Information

Sample name:shipping documents.exe
Analysis ID:1550114
MD5:9c7464fe8305d6260b6bb4ef0edb85d6
SHA1:20b44496a6a3986e47bc7f755c97b23a68464512
SHA256:c9a815444a848fe94cf548373c941bbdbbf097e3a106005a43c99c716a1ab626
Tags:AgentTeslaexeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • shipping documents.exe (PID: 4180 cmdline: "C:\Users\user\Desktop\shipping documents.exe" MD5: 9C7464FE8305D6260B6BB4EF0EDB85D6)
    • RegSvcs.exe (PID: 5844 cmdline: "C:\Users\user\Desktop\shipping documents.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • boqXv.exe (PID: 6104 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • boqXv.exe (PID: 3376 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.azmaplast.com", "Username": "info@azmaplast.com", "Password": "QAZqaz123@@"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
      • 0x33afc:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
      • 0x33b6e:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
      • 0x33bf8:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
      • 0x33c8a:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
      • 0x33cf4:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
      • 0x33d66:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
      • 0x33dfc:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
      • 0x33e8c:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
      00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 7 entries
          SourceRuleDescriptionAuthorStrings
          0.2.shipping documents.exe.7b0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.shipping documents.exe.7b0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.shipping documents.exe.7b0000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x31cfc:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x31d6e:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x31df8:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x31e8a:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x31ef4:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x31f66:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x31ffc:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x3208c:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              2.2.RegSvcs.exe.500000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                2.2.RegSvcs.exe.500000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5844, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 193.141.65.39, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 5844, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-06T13:57:13.224847+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549705TCP
                  2024-11-06T13:57:53.776957+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549915TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: shipping documents.exeAvira: detected
                  Source: 2.2.RegSvcs.exe.500000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.azmaplast.com", "Username": "info@azmaplast.com", "Password": "QAZqaz123@@"}
                  Source: shipping documents.exeReversingLabs: Detection: 57%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: shipping documents.exeJoe Sandbox ML: detected
                  Source: shipping documents.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000003.00000000.2150139795.00000000009C2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.2.dr
                  Source: Binary string: wntdll.pdbUGP source: shipping documents.exe, 00000000.00000003.2025462576.0000000003800000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.2026137500.00000000039A0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: shipping documents.exe, 00000000.00000003.2025462576.0000000003800000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.2026137500.00000000039A0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000003.00000000.2150139795.00000000009C2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.2.dr
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0060C2A2 FindFirstFileExW,0_2_0060C2A2
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006468EE FindFirstFileW,FindClose,0_2_006468EE
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0064698F
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0063D076
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0063D3A9
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00649642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00649642
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064979D
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00649B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00649B2B
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0063DBBE
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00645C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00645C97
                  Source: global trafficTCP traffic: 192.168.2.5:49704 -> 193.141.65.39:587
                  Source: Joe Sandbox ViewIP Address: 193.141.65.39 193.141.65.39
                  Source: Joe Sandbox ViewASN Name: KPNNL KPNNL
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49705
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49915
                  Source: global trafficTCP traffic: 192.168.2.5:49704 -> 193.141.65.39:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0064CE44
                  Source: global trafficDNS traffic detected: DNS query: mail.azmaplast.com
                  Source: RegSvcs.exe, 00000002.00000002.3287719939.000000000268A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.azmaplast.com
                  Source: shipping documents.exe, 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, FaJzHLniypp.cs.Net Code: _5cQa10w
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0064EAFF
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0064ED6A
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0064EAFF
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0063AA57
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00669576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00669576

                  System Summary

                  barindex
                  Source: 0.2.shipping documents.exe.7b0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: shipping documents.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: shipping documents.exe, 00000000.00000000.2014642708.0000000000692000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_42b2d24c-b
                  Source: shipping documents.exe, 00000000.00000000.2014642708.0000000000692000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_56b64491-2
                  Source: shipping documents.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7ccdfe67-6
                  Source: shipping documents.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0deafad8-8
                  Source: initial sampleStatic PE information: Filename: shipping documents.exe
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0063D5EB
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00631201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00631201
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0063E8F6
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005DBF400_2_005DBF40
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006420460_2_00642046
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D80600_2_005D8060
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006382980_2_00638298
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0060E4FF0_2_0060E4FF
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0060676B0_2_0060676B
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006648730_2_00664873
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005DCAF00_2_005DCAF0
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005FCAA00_2_005FCAA0
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005ECC390_2_005ECC39
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00606DD90_2_00606DD9
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005EB1190_2_005EB119
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D91C00_2_005D91C0
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F13940_2_005F1394
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F17060_2_005F1706
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F781B0_2_005F781B
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005E997D0_2_005E997D
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D79200_2_005D7920
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F19B00_2_005F19B0
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F7A4A0_2_005F7A4A
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F1C770_2_005F1C77
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F7CA70_2_005F7CA7
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0065BE440_2_0065BE44
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00609EEE0_2_00609EEE
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F1F320_2_005F1F32
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0111D5E80_2_0111D5E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023DD7382_2_023DD738
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023DA4A82_2_023DA4A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023D4AD02_2_023D4AD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023D98182_2_023D9818
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023D3EB82_2_023D3EB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023D42002_2_023D4200
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023DA4A42_2_023DA4A4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05068CD82_2_05068CD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0506B6902_2_0506B690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05828F482_2_05828F48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05829E982_2_05829E98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0582C0C02_2_0582C0C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0582E0C02_2_0582E0C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058200402_2_05820040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058243002_2_05824300
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05825A802_2_05825A80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058232A02_2_058232A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058253A02_2_058253A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05823A002_2_05823A00
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: String function: 005EF9F2 appears 40 times
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: String function: 005F0A30 appears 46 times
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: String function: 005D9CB3 appears 31 times
                  Source: shipping documents.exe, 00000000.00000003.2026614564.0000000003ACD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs shipping documents.exe
                  Source: shipping documents.exe, 00000000.00000003.2026025763.0000000003923000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs shipping documents.exe
                  Source: shipping documents.exe, 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename303ccb5a-e74e-425a-949b-a0bf6563c022.exe4 vs shipping documents.exe
                  Source: shipping documents.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.shipping documents.exe.7b0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, ivMw3WGb8.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, ivMw3WGb8.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, cdw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, cdw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@1/1
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006437B5 GetLastError,FormatMessageW,0_2_006437B5
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006310BF AdjustTokenPrivileges,CloseHandle,0_2_006310BF
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006316C3
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006451CD
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0065A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0065A67C
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0064648E
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005D42A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\boqXvJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2352:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2788:120:WilError_03
                  Source: C:\Users\user\Desktop\shipping documents.exeFile created: C:\Users\user\AppData\Local\Temp\ectosphereJump to behavior
                  Source: shipping documents.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: shipping documents.exeReversingLabs: Detection: 57%
                  Source: unknownProcess created: C:\Users\user\Desktop\shipping documents.exe "C:\Users\user\Desktop\shipping documents.exe"
                  Source: C:\Users\user\Desktop\shipping documents.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping documents.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\shipping documents.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping documents.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: shipping documents.exeStatic file information: File size 1387008 > 1048576
                  Source: shipping documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: shipping documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: shipping documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: shipping documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: shipping documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: shipping documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: shipping documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000003.00000000.2150139795.00000000009C2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.2.dr
                  Source: Binary string: wntdll.pdbUGP source: shipping documents.exe, 00000000.00000003.2025462576.0000000003800000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.2026137500.00000000039A0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: shipping documents.exe, 00000000.00000003.2025462576.0000000003800000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.2026137500.00000000039A0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000003.00000000.2150139795.00000000009C2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.2.dr
                  Source: shipping documents.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: shipping documents.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: shipping documents.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: shipping documents.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: shipping documents.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005D42DE
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F0A76 push ecx; ret 0_2_005F0A89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_023DA3E8 pushad ; retf 0260h2_2_023DA4A1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005EF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005EF98E
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00661C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00661C41
                  Source: C:\Users\user\Desktop\shipping documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\shipping documents.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96071
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\shipping documents.exeAPI/Special instruction interceptor: Address: 111D20C
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 4C80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2680000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2680000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1067Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5294Jump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeAPI coverage: 3.4 %
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 6568Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 6984Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0060C2A2 FindFirstFileExW,0_2_0060C2A2
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006468EE FindFirstFileW,FindClose,0_2_006468EE
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0064698F
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0063D076
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0063D3A9
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00649642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00649642
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064979D
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00649B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00649B2B
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0063DBBE
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00645C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00645C97
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005D42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99219Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98090Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97876Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97627Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97480Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97374Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.3289323441.000000000574A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0064EAA2 BlockInput,0_2_0064EAA2
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00602622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00602622
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005D42DE
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F4CE8 mov eax, dword ptr fs:[00000030h]0_2_005F4CE8
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0111D478 mov eax, dword ptr fs:[00000030h]0_2_0111D478
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0111D4D8 mov eax, dword ptr fs:[00000030h]0_2_0111D4D8
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0111BE58 mov eax, dword ptr fs:[00000030h]0_2_0111BE58
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00630B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00630B62
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00602622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00602622
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005F083F
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F09D5 SetUnhandledExceptionFilter,0_2_005F09D5
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005F0C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 2B8008Jump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00631201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00631201
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00612BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00612BA5
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0063B226 SendInput,keybd_event,0_2_0063B226
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_006522DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_006522DA
                  Source: C:\Users\user\Desktop\shipping documents.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping documents.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00630B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00630B62
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00631663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00631663
                  Source: shipping documents.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: shipping documents.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005F0698 cpuid 0_2_005F0698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00648195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00648195
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0062D27A GetUserNameW,0_2_0062D27A
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0060B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0060B952
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_005D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005D42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.shipping documents.exe.7b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.500000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3287719939.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3287719939.0000000002682000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: shipping documents.exe PID: 4180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5844, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: shipping documents.exeBinary or memory string: WIN_81
                  Source: shipping documents.exeBinary or memory string: WIN_XP
                  Source: shipping documents.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: shipping documents.exeBinary or memory string: WIN_XPe
                  Source: shipping documents.exeBinary or memory string: WIN_VISTA
                  Source: shipping documents.exeBinary or memory string: WIN_7
                  Source: shipping documents.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 0.2.shipping documents.exe.7b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.500000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3287719939.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: shipping documents.exe PID: 4180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5844, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.shipping documents.exe.7b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.500000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.shipping documents.exe.7b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3287719939.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3287719939.0000000002682000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: shipping documents.exe PID: 4180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5844, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00651204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00651204
                  Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00651806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00651806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  Registry Run Keys / Startup Folder
                  2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets331
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Registry Run Keys / Startup Folder
                  2
                  Valid Accounts
                  Cached Domain Credentials241
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items241
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Hidden Files and Directories
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  shipping documents.exe58%ReversingLabsWin32.Trojan.AgentTesla
                  shipping documents.exe100%AviraDR/AutoIt.Gen8
                  shipping documents.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\boqXv\boqXv.exe0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  mail.azmaplast.com
                  193.141.65.39
                  truetrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://mail.azmaplast.comRegSvcs.exe, 00000002.00000002.3287719939.000000000268A000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://account.dyn.com/shipping documents.exe, 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        193.141.65.39
                        mail.azmaplast.comIran (ISLAMIC Republic Of)
                        286KPNNLtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1550114
                        Start date and time:2024-11-06 13:56:06 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 18s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:9
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:shipping documents.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@7/5@1/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:
                        • Successful, ratio: 98%
                        • Number of executed functions: 43
                        • Number of non-executed functions: 305
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target boqXv.exe, PID 3376 because it is empty
                        • Execution Graph export aborted for target boqXv.exe, PID 6104 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: shipping documents.exe
                        TimeTypeDescription
                        07:56:56API Interceptor31x Sleep call for process: RegSvcs.exe modified
                        13:56:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                        13:57:07AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        193.141.65.39Massive.exeGet hashmaliciousAgentTeslaBrowse
                          M.BL CSLEBKK2311030B.exeGet hashmaliciousAgentTeslaBrowse
                            DHL_CBJ520818836689.exeGet hashmaliciousAgentTeslaBrowse
                              DHL- CBJ520818836689.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                DHL- CBJ520818836689.exeGet hashmaliciousAgentTeslaBrowse
                                  Bank Details.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    invoice and packing list.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      PO202408030008.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        shipping documents.bat.exeGet hashmaliciousAgentTeslaBrowse
                                          INV&PL.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            mail.azmaplast.comMassive.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            M.BL CSLEBKK2311030B.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            DHL_CBJ520818836689.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            DHL- CBJ520818836689.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            DHL- CBJ520818836689.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            Bank Details.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            • 193.141.65.39
                                            invoice and packing list.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 193.141.65.39
                                            PO202408030008.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            shipping documents.bat.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            INV&PL.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 193.141.65.39
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            KPNNLdebug.dbg.elfGet hashmaliciousMirai, GafgytBrowse
                                            • 134.222.133.1
                                            Massive.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            belks.sh4.elfGet hashmaliciousMiraiBrowse
                                            • 62.132.39.148
                                            belks.x86.elfGet hashmaliciousMiraiBrowse
                                            • 62.132.193.101
                                            la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                            • 92.71.180.85
                                            nklppc.elfGet hashmaliciousUnknownBrowse
                                            • 62.132.121.20
                                            splppc.elfGet hashmaliciousUnknownBrowse
                                            • 134.222.54.52
                                            kkkarm7.elfGet hashmaliciousUnknownBrowse
                                            • 62.132.182.14
                                            la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                            • 92.71.46.78
                                            M.BL CSLEBKK2311030B.exeGet hashmaliciousAgentTeslaBrowse
                                            • 193.141.65.39
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Roaming\boqXv\boqXv.exeTermination_List_November_2024_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                              Payment_Advice_USD_48,054.40_.exeGet hashmaliciousAgentTeslaBrowse
                                                M1Y6kc9FpE.exeGet hashmaliciousFormBookBrowse
                                                  mJIvCBk5vF.exeGet hashmaliciousFormBookBrowse
                                                    1aG5DoOsAW.exeGet hashmaliciousFormBookBrowse
                                                      copto de pago.exeGet hashmaliciousAgentTeslaBrowse
                                                        purchase order P857248 dated 04112024.exeGet hashmaliciousXWormBrowse
                                                          dJpo3HPctv.exeGet hashmaliciousXWormBrowse
                                                            Payslip_October_2024_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                              Payslip_October_2024.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):142
                                                                Entropy (8bit):5.090621108356562
                                                                Encrypted:false
                                                                SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                MD5:8C0458BB9EA02D50565175E38D577E35
                                                                SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                Process:C:\Users\user\Desktop\shipping documents.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):241664
                                                                Entropy (8bit):6.652588616337229
                                                                Encrypted:false
                                                                SSDEEP:6144:nMYCJ5pfWj9bPXjckZniMKGwXMugsz0oOF:MnQ9b9KGw8ug5F
                                                                MD5:C19AABB9B1C43DBA3321A8796D3D959A
                                                                SHA1:76F672007DDF1360566B2ABD7DDE60E440FADC05
                                                                SHA-256:B564A6BD4FFBE43E822F2FFC358EE1DE98AA40524166737A30F205E4D4C0CF35
                                                                SHA-512:281A7F0883695EB730612DE478CD82BD4716648D9D7650AE18985825D358ACB26697476578B834C7C5806CC44BCC986CA4DF5F6C5034EE1DEC751E2F58D51901
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:...0LZ3YRHF9..SN.0OZ3YVH.9NISN40OZ3YVHF9NISN40OZ3YVHF9NISN40.Z3YXW.7N.Z...N..x. /Jn9!!SB.7.:7&(V:i1+.B:4.08h.v.i>!PUaW>SrHF9NISNduOZ.XUH..`/SN40OZ3Y.HD8EHXN4.LZ3QVHF9NI.70Oz3YV.E9NI.N4.OZ3[VHB9NISN40KZ3YVHF9NiWN42OZ3YVHD9..SN$0OJ3YVHV9NYSN40OZ#YVHF9NISN40{.0Y.HF9N.PNr5OZ3YVHF9NISN40OZ3YVHB9BISN40OZ3YVHF9NISN40OZ3YVHF9NISN40OZ3YVHF9NISN40OZ3YVhF9FISN40OZ3YVHN.NI.N40OZ3YVHF9`=66@0OZ..UHF.NIS.70OX3YVHF9NISN40OZ.YV(hK=;0N40._3YV.E9NOSN4.LZ3YVHF9NISN40.Z3.x:#U!*SN80OZ3YRHF;NIS.70OZ3YVHF9NISNt0O.3YVHF9NISN40OZ3Y&.E9NISN|0OZ1YSH~.LI.|50LZ3YWHF?NISN40OZ3YVHF9NISN40OZ3YVHF9NISN40OZ3YVHF9NISN40R........4mDV7.|.>.K..]..7..@.&.-\....^.....,P..9.Fc..F...=.1K0R......9]9HQ.>|AU.R...ugM...HZ.5..(z.WHm.g...|.....6:....D..P6;f'I>%6`gQ);A0.J.8NISN......../A..~M;.{HK....z[+.....MYVH"9NI!N40.Z3Y.HF9!ISNZ0OZMYVH89NI.N40.Z3YaHF9kISNY0OZ.YVH89NI.3;?...0%.9NISN...j.4...f.~...>.M.4p..-...jJ..V>.1z....:..1..A.-?m..I56K_1^RKJ.@.....M^7\TOB:Bt]...{......."... .%VHF9NI.N4.OZ3..H.9NI.N.0..3YV.9.I.N...Z
                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:modified
                                                                Size (bytes):45984
                                                                Entropy (8bit):6.16795797263964
                                                                Encrypted:false
                                                                SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                                MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                                SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                                SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                                SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: Termination_List_November_2024_pdf.exe, Detection: malicious, Browse
                                                                • Filename: Payment_Advice_USD_48,054.40_.exe, Detection: malicious, Browse
                                                                • Filename: M1Y6kc9FpE.exe, Detection: malicious, Browse
                                                                • Filename: mJIvCBk5vF.exe, Detection: malicious, Browse
                                                                • Filename: 1aG5DoOsAW.exe, Detection: malicious, Browse
                                                                • Filename: copto de pago.exe, Detection: malicious, Browse
                                                                • Filename: purchase order P857248 dated 04112024.exe, Detection: malicious, Browse
                                                                • Filename: dJpo3HPctv.exe, Detection: malicious, Browse
                                                                • Filename: Payslip_October_2024_pdf.exe, Detection: malicious, Browse
                                                                • Filename: Payslip_October_2024.pdf.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1141
                                                                Entropy (8bit):4.442398121585593
                                                                Encrypted:false
                                                                SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                                MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                                SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                                SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                                SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.265100949077372
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:shipping documents.exe
                                                                File size:1'387'008 bytes
                                                                MD5:9c7464fe8305d6260b6bb4ef0edb85d6
                                                                SHA1:20b44496a6a3986e47bc7f755c97b23a68464512
                                                                SHA256:c9a815444a848fe94cf548373c941bbdbbf097e3a106005a43c99c716a1ab626
                                                                SHA512:f2142c3dfb301f6294bdf6dc9b262fa1901f471f87571c0cb7873c226b68eca6ee96ce71c3c5a2989bb59b7ce9d2c4787cfd757c017b2dbd0616ef1be660905d
                                                                SSDEEP:24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8aMbq4Fa37l78IcxPP:ETvC/MTQYxsWR7aMbDa3x783R
                                                                TLSH:1555D00273D18022FF9B92334F5AF6515BBC69660123E61F13981DBABE701B1563E7A3
                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                Icon Hash:aaf3e3e3938382a0
                                                                Entrypoint:0x420577
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x672A2E39 [Tue Nov 5 14:39:53 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:948cc502fe9226992dce9417f952fce3
                                                                Instruction
                                                                call 00007F3204B617A3h
                                                                jmp 00007F3204B610AFh
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                push dword ptr [ebp+08h]
                                                                mov esi, ecx
                                                                call 00007F3204B6128Dh
                                                                mov dword ptr [esi], 0049FDF0h
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                and dword ptr [ecx+04h], 00000000h
                                                                mov eax, ecx
                                                                and dword ptr [ecx+08h], 00000000h
                                                                mov dword ptr [ecx+04h], 0049FDF8h
                                                                mov dword ptr [ecx], 0049FDF0h
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                push dword ptr [ebp+08h]
                                                                mov esi, ecx
                                                                call 00007F3204B6125Ah
                                                                mov dword ptr [esi], 0049FE0Ch
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                and dword ptr [ecx+04h], 00000000h
                                                                mov eax, ecx
                                                                and dword ptr [ecx+08h], 00000000h
                                                                mov dword ptr [ecx+04h], 0049FE14h
                                                                mov dword ptr [ecx], 0049FE0Ch
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                mov esi, ecx
                                                                lea eax, dword ptr [esi+04h]
                                                                mov dword ptr [esi], 0049FDD0h
                                                                and dword ptr [eax], 00000000h
                                                                and dword ptr [eax+04h], 00000000h
                                                                push eax
                                                                mov eax, dword ptr [ebp+08h]
                                                                add eax, 04h
                                                                push eax
                                                                call 00007F3204B63E4Dh
                                                                pop ecx
                                                                pop ecx
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                lea eax, dword ptr [ecx+04h]
                                                                mov dword ptr [ecx], 0049FDD0h
                                                                push eax
                                                                call 00007F3204B63E98h
                                                                pop ecx
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                mov esi, ecx
                                                                lea eax, dword ptr [esi+04h]
                                                                mov dword ptr [esi], 0049FDD0h
                                                                push eax
                                                                call 00007F3204B63E81h
                                                                test byte ptr [ebp+08h], 00000001h
                                                                pop ecx
                                                                Programming Language:
                                                                • [ C ] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 SP1 build 30729
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x7bf64.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1500000x7594.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0xd40000x7bf640x7c000f9aa2e11a549de1ea451e1915487c138False0.9471533990675404data7.934353765891544IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x1500000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                RT_RCDATA0xdc7b80x7322cdata1.0003201893145828
                                                                RT_GROUP_ICON0x14f9e40x76dataEnglishGreat Britain0.6610169491525424
                                                                RT_GROUP_ICON0x14fa5c0x14dataEnglishGreat Britain1.25
                                                                RT_GROUP_ICON0x14fa700x14dataEnglishGreat Britain1.15
                                                                RT_GROUP_ICON0x14fa840x14dataEnglishGreat Britain1.25
                                                                RT_VERSION0x14fa980xdcdataEnglishGreat Britain0.6181818181818182
                                                                RT_MANIFEST0x14fb740x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                DLLImport
                                                                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                UxTheme.dllIsThemeActive
                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishGreat Britain
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-06T13:57:13.224847+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549705TCP
                                                                2024-11-06T13:57:53.776957+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549915TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 6, 2024 13:56:57.459990025 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:56:57.467408895 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:56:57.467492104 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:56:59.079545021 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:56:59.080677032 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:56:59.085788012 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:56:59.417027950 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:56:59.446702003 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:56:59.451587915 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:56:59.781907082 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:56:59.784070969 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:56:59.788923979 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:57:00.136451006 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:57:00.136665106 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:57:00.141535997 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:57:00.471923113 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:57:00.472096920 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:57:00.477045059 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:57:01.010912895 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:57:01.029334068 CET49704587192.168.2.5193.141.65.39
                                                                Nov 6, 2024 13:57:01.035073996 CET58749704193.141.65.39192.168.2.5
                                                                Nov 6, 2024 13:57:01.035123110 CET49704587192.168.2.5193.141.65.39
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 6, 2024 13:56:57.356534004 CET6502853192.168.2.51.1.1.1
                                                                Nov 6, 2024 13:56:57.451839924 CET53650281.1.1.1192.168.2.5
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 6, 2024 13:56:57.356534004 CET192.168.2.51.1.1.10xd269Standard query (0)mail.azmaplast.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 6, 2024 13:56:57.451839924 CET1.1.1.1192.168.2.50xd269No error (0)mail.azmaplast.com193.141.65.39A (IP address)IN (0x0001)false
                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                Nov 6, 2024 13:56:59.079545021 CET58749704193.141.65.39192.168.2.5220 lh222.irandns.com mail server
                                                                Nov 6, 2024 13:56:59.080677032 CET49704587192.168.2.5193.141.65.39EHLO 347688
                                                                Nov 6, 2024 13:56:59.417027950 CET58749704193.141.65.39192.168.2.5250-lh222.irandns.com Hello 347688 [173.254.250.80]
                                                                250-SIZE 524288000
                                                                250-LIMITS MAILMAX=100 RCPTMAX=150
                                                                250-8BITMIME
                                                                250-PIPELINING
                                                                250-PIPECONNECT
                                                                250-AUTH PLAIN LOGIN
                                                                250-STARTTLS
                                                                250 HELP
                                                                Nov 6, 2024 13:56:59.446702003 CET49704587192.168.2.5193.141.65.39AUTH login aW5mb0Bhem1hcGxhc3QuY29t
                                                                Nov 6, 2024 13:56:59.781907082 CET58749704193.141.65.39192.168.2.5334 UGFzc3dvcmQ6
                                                                Nov 6, 2024 13:57:00.136451006 CET58749704193.141.65.39192.168.2.5235 Authentication succeeded
                                                                Nov 6, 2024 13:57:00.136665106 CET49704587192.168.2.5193.141.65.39MAIL FROM:<info@azmaplast.com>
                                                                Nov 6, 2024 13:57:00.471923113 CET58749704193.141.65.39192.168.2.5250 OK
                                                                Nov 6, 2024 13:57:00.472096920 CET49704587192.168.2.5193.141.65.39RCPT TO:<blessedpeter001@gmail.com>
                                                                Nov 6, 2024 13:57:01.010912895 CET58749704193.141.65.39192.168.2.5550 User account info@azmaplast.com has sent too many emails

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:07:56:53
                                                                Start date:06/11/2024
                                                                Path:C:\Users\user\Desktop\shipping documents.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\shipping documents.exe"
                                                                Imagebase:0x5d0000
                                                                File size:1'387'008 bytes
                                                                MD5 hash:9C7464FE8305D6260B6BB4EF0EDB85D6
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2027082601.00000000007B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:07:56:54
                                                                Start date:06/11/2024
                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\shipping documents.exe"
                                                                Imagebase:0x100000
                                                                File size:45'984 bytes
                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3286681908.0000000000502000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3287719939.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3287719939.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3287719939.0000000002682000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:3
                                                                Start time:07:57:07
                                                                Start date:06/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                                                Imagebase:0x9c0000
                                                                File size:45'984 bytes
                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:4
                                                                Start time:07:57:07
                                                                Start date:06/11/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6d64d0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:07:57:15
                                                                Start date:06/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                                                Imagebase:0x560000
                                                                File size:45'984 bytes
                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:07:57:15
                                                                Start date:06/11/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6d64d0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:2.7%
                                                                  Dynamic/Decrypted Code Coverage:1.1%
                                                                  Signature Coverage:5.6%
                                                                  Total number of Nodes:1584
                                                                  Total number of Limit Nodes:35
                                                                  execution_graph 95842 608402 95847 6081be 95842->95847 95845 60842a 95852 6081ef try_get_first_available_module 95847->95852 95849 6083ee 95866 6027ec 26 API calls ___std_exception_copy 95849->95866 95851 608343 95851->95845 95859 610984 95851->95859 95852->95852 95855 608338 95852->95855 95862 5f8e0b 40 API calls 2 library calls 95852->95862 95854 60838c 95854->95855 95863 5f8e0b 40 API calls 2 library calls 95854->95863 95855->95851 95865 5ff2d9 20 API calls _abort 95855->95865 95857 6083ab 95857->95855 95864 5f8e0b 40 API calls 2 library calls 95857->95864 95867 610081 95859->95867 95861 61099f 95861->95845 95862->95854 95863->95857 95864->95855 95865->95849 95866->95851 95868 61008d ___BuildCatchObject 95867->95868 95869 61009b 95868->95869 95871 6100d4 95868->95871 95925 5ff2d9 20 API calls _abort 95869->95925 95878 61065b 95871->95878 95872 6100a0 95926 6027ec 26 API calls ___std_exception_copy 95872->95926 95877 6100aa __wsopen_s 95877->95861 95928 61042f 95878->95928 95881 6106a6 95946 605221 95881->95946 95882 61068d 95960 5ff2c6 20 API calls _abort 95882->95960 95885 6106ab 95887 6106b4 95885->95887 95888 6106cb 95885->95888 95886 610692 95961 5ff2d9 20 API calls _abort 95886->95961 95962 5ff2c6 20 API calls _abort 95887->95962 95959 61039a CreateFileW 95888->95959 95892 6106b9 95963 5ff2d9 20 API calls _abort 95892->95963 95893 6100f8 95927 610121 LeaveCriticalSection __wsopen_s 95893->95927 95895 610781 GetFileType 95896 6107d3 95895->95896 95897 61078c GetLastError 95895->95897 95968 60516a 21 API calls 2 library calls 95896->95968 95966 5ff2a3 20 API calls __dosmaperr 95897->95966 95898 610756 GetLastError 95965 5ff2a3 20 API calls __dosmaperr 95898->95965 95901 610704 95901->95895 95901->95898 95964 61039a CreateFileW 95901->95964 95902 61079a CloseHandle 95902->95886 95904 6107c3 95902->95904 95967 5ff2d9 20 API calls _abort 95904->95967 95906 610749 95906->95895 95906->95898 95907 6107f4 95909 610840 95907->95909 95969 6105ab 72 API calls 3 library calls 95907->95969 95914 61086d 95909->95914 95970 61014d 72 API calls 4 library calls 95909->95970 95910 6107c8 95910->95886 95913 610866 95913->95914 95915 61087e 95913->95915 95971 6086ae 95914->95971 95915->95893 95917 6108fc CloseHandle 95915->95917 95986 61039a CreateFileW 95917->95986 95919 610927 95920 610931 GetLastError 95919->95920 95924 61095d 95919->95924 95987 5ff2a3 20 API calls __dosmaperr 95920->95987 95922 61093d 95988 605333 21 API calls 2 library calls 95922->95988 95924->95893 95925->95872 95926->95877 95927->95877 95929 610450 95928->95929 95936 61046a 95928->95936 95929->95936 95996 5ff2d9 20 API calls _abort 95929->95996 95932 61045f 95997 6027ec 26 API calls ___std_exception_copy 95932->95997 95934 6104d1 95943 610524 95934->95943 96000 5fd70d 26 API calls 2 library calls 95934->96000 95935 6104a2 95935->95934 95998 5ff2d9 20 API calls _abort 95935->95998 95989 6103bf 95936->95989 95939 61051f 95941 61059e 95939->95941 95939->95943 95940 6104c6 95999 6027ec 26 API calls ___std_exception_copy 95940->95999 96001 6027fc 11 API calls _abort 95941->96001 95943->95881 95943->95882 95945 6105aa 95947 60522d ___BuildCatchObject 95946->95947 96004 602f5e EnterCriticalSection 95947->96004 95949 60527b 96005 60532a 95949->96005 95950 605259 96008 605000 95950->96008 95951 605234 95951->95949 95951->95950 95956 6052c7 EnterCriticalSection 95951->95956 95954 6052a4 __wsopen_s 95954->95885 95956->95949 95957 6052d4 LeaveCriticalSection 95956->95957 95957->95951 95959->95901 95960->95886 95961->95893 95962->95892 95963->95886 95964->95906 95965->95886 95966->95902 95967->95910 95968->95907 95969->95909 95970->95913 96034 6053c4 95971->96034 95973 6086c4 96047 605333 21 API calls 2 library calls 95973->96047 95975 6086be 95975->95973 95976 6053c4 __wsopen_s 26 API calls 95975->95976 95985 6086f6 95975->95985 95980 6086ed 95976->95980 95977 6053c4 __wsopen_s 26 API calls 95981 608702 CloseHandle 95977->95981 95978 60873e 95978->95893 95979 60871c 95979->95978 96048 5ff2a3 20 API calls __dosmaperr 95979->96048 95983 6053c4 __wsopen_s 26 API calls 95980->95983 95981->95973 95984 60870e GetLastError 95981->95984 95983->95985 95984->95973 95985->95973 95985->95977 95986->95919 95987->95922 95988->95924 95991 6103d7 95989->95991 95990 6103f2 95990->95935 95991->95990 96002 5ff2d9 20 API calls _abort 95991->96002 95993 610416 96003 6027ec 26 API calls ___std_exception_copy 95993->96003 95995 610421 95995->95935 95996->95932 95997->95936 95998->95940 95999->95934 96000->95939 96001->95945 96002->95993 96003->95995 96004->95951 96016 602fa6 LeaveCriticalSection 96005->96016 96007 605331 96007->95954 96017 604c7d 96008->96017 96010 605012 96014 60501f 96010->96014 96024 603405 11 API calls 2 library calls 96010->96024 96012 605071 96012->95949 96015 605147 EnterCriticalSection 96012->96015 96025 6029c8 96014->96025 96015->95949 96016->96007 96022 604c8a pre_c_initialization 96017->96022 96018 604cca 96032 5ff2d9 20 API calls _abort 96018->96032 96019 604cb5 RtlAllocateHeap 96021 604cc8 96019->96021 96019->96022 96021->96010 96022->96018 96022->96019 96031 5f4ead 7 API calls 2 library calls 96022->96031 96024->96010 96026 6029fc __dosmaperr 96025->96026 96027 6029d3 RtlFreeHeap 96025->96027 96026->96012 96027->96026 96028 6029e8 96027->96028 96033 5ff2d9 20 API calls _abort 96028->96033 96030 6029ee GetLastError 96030->96026 96031->96022 96032->96021 96033->96030 96035 6053d1 96034->96035 96036 6053e6 96034->96036 96049 5ff2c6 20 API calls _abort 96035->96049 96040 60540b 96036->96040 96051 5ff2c6 20 API calls _abort 96036->96051 96039 6053d6 96050 5ff2d9 20 API calls _abort 96039->96050 96040->95975 96041 605416 96052 5ff2d9 20 API calls _abort 96041->96052 96044 6053de 96044->95975 96045 60541e 96053 6027ec 26 API calls ___std_exception_copy 96045->96053 96047->95979 96048->95978 96049->96039 96050->96044 96051->96041 96052->96045 96053->96044 96054 622a00 96069 5dd7b0 messages 96054->96069 96055 5ddb11 PeekMessageW 96055->96069 96056 5dd807 GetInputState 96056->96055 96056->96069 96058 621cbe TranslateAcceleratorW 96058->96069 96059 5ddb8f PeekMessageW 96059->96069 96060 5dda04 timeGetTime 96060->96069 96061 5ddb73 TranslateMessage DispatchMessageW 96061->96059 96062 5ddbaf Sleep 96080 5ddbc0 96062->96080 96063 622b74 Sleep 96063->96080 96064 5ee551 timeGetTime 96064->96080 96065 621dda timeGetTime 96232 5ee300 23 API calls 96065->96232 96068 622c0b GetExitCodeProcess 96073 622c21 WaitForSingleObject 96068->96073 96074 622c37 CloseHandle 96068->96074 96069->96055 96069->96056 96069->96058 96069->96059 96069->96060 96069->96061 96069->96062 96069->96063 96069->96065 96070 5dd9d5 96069->96070 96086 5ddd50 96069->96086 96093 5ddfd0 96069->96093 96116 5e1310 96069->96116 96173 5dbf40 96069->96173 96231 5eedf6 IsDialogMessageW GetClassLongW 96069->96231 96233 643a2a 23 API calls 96069->96233 96234 5dec40 96069->96234 96258 64359c 82 API calls __wsopen_s 96069->96258 96071 6629bf GetForegroundWindow 96071->96080 96073->96069 96073->96074 96074->96080 96075 622a31 96075->96070 96076 622ca9 Sleep 96076->96069 96080->96064 96080->96068 96080->96069 96080->96070 96080->96071 96080->96075 96080->96076 96259 655658 23 API calls 96080->96259 96260 63e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96080->96260 96261 63d4dc 47 API calls 96080->96261 96087 5ddd6f 96086->96087 96088 5ddd83 96086->96088 96262 5dd260 207 API calls 2 library calls 96087->96262 96263 64359c 82 API calls __wsopen_s 96088->96263 96090 5ddd7a 96090->96069 96092 622f75 96092->96092 96094 5de010 96093->96094 96109 5de0dc messages 96094->96109 96267 5f0242 5 API calls __Init_thread_wait 96094->96267 96097 622fca 96097->96109 96268 5da961 96097->96268 96098 5da961 22 API calls 96098->96109 96104 622fee 96274 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96104->96274 96108 5dec40 207 API calls 96108->96109 96109->96098 96109->96108 96111 5de3e1 96109->96111 96112 5e04f0 22 API calls 96109->96112 96115 64359c 82 API calls 96109->96115 96264 5da8c7 22 API calls __fread_nolock 96109->96264 96265 5da81b 41 API calls 96109->96265 96266 5ea308 207 API calls 96109->96266 96275 5f0242 5 API calls __Init_thread_wait 96109->96275 96276 5f00a3 29 API calls __onexit 96109->96276 96277 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96109->96277 96278 6547d4 207 API calls 96109->96278 96279 6568c1 207 API calls 96109->96279 96111->96069 96112->96109 96115->96109 96117 5e1376 96116->96117 96118 5e17b0 96116->96118 96119 626331 96117->96119 96120 5e1390 96117->96120 96406 5f0242 5 API calls __Init_thread_wait 96118->96406 96417 65709c 207 API calls 96119->96417 96315 5e1940 96120->96315 96124 5e17ba 96127 5e17fb 96124->96127 96407 5d9cb3 96124->96407 96126 62633d 96126->96069 96131 626346 96127->96131 96133 5e182c 96127->96133 96128 5e1940 9 API calls 96130 5e13b6 96128->96130 96130->96127 96132 5e13ec 96130->96132 96418 64359c 82 API calls __wsopen_s 96131->96418 96132->96131 96139 5e1408 __fread_nolock 96132->96139 96414 5daceb 23 API calls messages 96133->96414 96136 5e1839 96415 5ed217 207 API calls 96136->96415 96137 5e17d4 96413 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96137->96413 96139->96136 96141 62636e 96139->96141 96148 5efddb 22 API calls 96139->96148 96150 5efe0b 22 API calls 96139->96150 96155 5dec40 207 API calls 96139->96155 96156 5e152f 96139->96156 96157 6263b2 96139->96157 96160 626369 96139->96160 96419 64359c 82 API calls __wsopen_s 96141->96419 96143 5e153c 96145 5e1940 9 API calls 96143->96145 96144 6263d1 96421 655745 54 API calls _wcslen 96144->96421 96147 5e1549 96145->96147 96151 6264fa 96147->96151 96153 5e1940 9 API calls 96147->96153 96148->96139 96149 5e1872 96416 5efaeb 23 API calls 96149->96416 96150->96139 96151->96160 96423 64359c 82 API calls __wsopen_s 96151->96423 96158 5e1563 96153->96158 96155->96139 96156->96143 96156->96144 96420 64359c 82 API calls __wsopen_s 96157->96420 96158->96151 96163 5e15c7 messages 96158->96163 96422 5da8c7 22 API calls __fread_nolock 96158->96422 96160->96069 96162 5e1940 9 API calls 96162->96163 96163->96149 96163->96151 96163->96160 96163->96162 96165 5e167b messages 96163->96165 96325 64f0ec 96163->96325 96334 5d6216 96163->96334 96339 5d6246 96163->96339 96343 65958b 96163->96343 96346 6483da 96163->96346 96349 64744a 96163->96349 96164 5e171d 96164->96069 96165->96164 96405 5ece17 22 API calls messages 96165->96405 96736 5dadf0 96173->96736 96175 5dbf9d 96176 6204b6 96175->96176 96177 5dbfa9 96175->96177 96755 64359c 82 API calls __wsopen_s 96176->96755 96179 5dc01e 96177->96179 96180 6204c6 96177->96180 96741 5dac91 96179->96741 96756 64359c 82 API calls __wsopen_s 96180->96756 96183 6204f5 96194 62055a 96183->96194 96757 5ed217 207 API calls 96183->96757 96184 5dc7da 96188 5efe0b 22 API calls 96184->96188 96193 5dc808 __fread_nolock 96188->96193 96192 5dc039 __fread_nolock messages 96192->96183 96192->96184 96192->96193 96192->96194 96195 5dec40 207 API calls 96192->96195 96196 5daf8a 22 API calls 96192->96196 96197 637120 22 API calls 96192->96197 96198 62091a 96192->96198 96202 6208a5 96192->96202 96206 620591 96192->96206 96209 6208f6 96192->96209 96213 5dc237 96192->96213 96216 5dc603 96192->96216 96220 5efddb 22 API calls 96192->96220 96223 6209bf 96192->96223 96226 5dbbe0 40 API calls 96192->96226 96229 5efe0b 22 API calls 96192->96229 96745 5dad81 96192->96745 96760 637099 22 API calls __fread_nolock 96192->96760 96761 655745 54 API calls _wcslen 96192->96761 96762 5eaa42 22 API calls messages 96192->96762 96763 63f05c 40 API calls 96192->96763 96764 5da993 41 API calls 96192->96764 96765 5daceb 23 API calls messages 96192->96765 96199 5efe0b 22 API calls 96193->96199 96194->96216 96758 64359c 82 API calls __wsopen_s 96194->96758 96195->96192 96196->96192 96197->96192 96768 643209 23 API calls 96198->96768 96228 5dc350 __fread_nolock messages 96199->96228 96203 5dec40 207 API calls 96202->96203 96205 6208cf 96203->96205 96205->96216 96766 5da81b 41 API calls 96205->96766 96759 64359c 82 API calls __wsopen_s 96206->96759 96767 64359c 82 API calls __wsopen_s 96209->96767 96214 5dc253 96213->96214 96769 5da8c7 22 API calls __fread_nolock 96213->96769 96217 620976 96214->96217 96221 5dc297 messages 96214->96221 96216->96069 96770 5daceb 23 API calls messages 96217->96770 96220->96192 96221->96223 96752 5daceb 23 API calls messages 96221->96752 96223->96216 96771 64359c 82 API calls __wsopen_s 96223->96771 96224 5dc335 96224->96223 96225 5dc342 96224->96225 96753 5da704 22 API calls messages 96225->96753 96226->96192 96230 5dc3ac 96228->96230 96754 5ece17 22 API calls messages 96228->96754 96229->96192 96230->96069 96231->96069 96232->96069 96233->96069 96254 5dec76 messages 96234->96254 96235 5efddb 22 API calls 96235->96254 96236 5f0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96236->96254 96237 5f00a3 29 API calls pre_c_initialization 96237->96254 96239 5dfef7 96251 5ded9d messages 96239->96251 96784 5da8c7 22 API calls __fread_nolock 96239->96784 96241 624b0b 96786 64359c 82 API calls __wsopen_s 96241->96786 96242 5da8c7 22 API calls 96242->96254 96243 624600 96243->96251 96783 5da8c7 22 API calls __fread_nolock 96243->96783 96249 5dfbe3 96249->96251 96252 624bdc 96249->96252 96257 5df3ae messages 96249->96257 96250 5da961 22 API calls 96250->96254 96251->96069 96787 64359c 82 API calls __wsopen_s 96252->96787 96254->96235 96254->96236 96254->96237 96254->96239 96254->96241 96254->96242 96254->96243 96254->96249 96254->96250 96254->96251 96255 624beb 96254->96255 96256 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96254->96256 96254->96257 96781 5e01e0 207 API calls 2 library calls 96254->96781 96782 5e06a0 41 API calls messages 96254->96782 96788 64359c 82 API calls __wsopen_s 96255->96788 96256->96254 96257->96251 96785 64359c 82 API calls __wsopen_s 96257->96785 96258->96069 96259->96080 96260->96080 96261->96080 96262->96090 96263->96092 96264->96109 96265->96109 96266->96109 96267->96097 96280 5efe0b 96268->96280 96270 5da976 96290 5efddb 96270->96290 96272 5da984 96273 5f00a3 29 API calls __onexit 96272->96273 96273->96104 96274->96109 96275->96109 96276->96109 96277->96109 96278->96109 96279->96109 96283 5efddb 96280->96283 96282 5efdfa 96282->96270 96283->96282 96286 5efdfc 96283->96286 96300 5fea0c 96283->96300 96307 5f4ead 7 API calls 2 library calls 96283->96307 96285 5f066d 96309 5f32a4 RaiseException 96285->96309 96286->96285 96308 5f32a4 RaiseException 96286->96308 96289 5f068a 96289->96270 96293 5efde0 96290->96293 96291 5fea0c ___std_exception_copy 21 API calls 96291->96293 96292 5efdfa 96292->96272 96293->96291 96293->96292 96295 5efdfc 96293->96295 96312 5f4ead 7 API calls 2 library calls 96293->96312 96296 5f066d 96295->96296 96313 5f32a4 RaiseException 96295->96313 96314 5f32a4 RaiseException 96296->96314 96299 5f068a 96299->96272 96305 603820 pre_c_initialization 96300->96305 96301 60385e 96311 5ff2d9 20 API calls _abort 96301->96311 96303 603849 RtlAllocateHeap 96304 60385c 96303->96304 96303->96305 96304->96283 96305->96301 96305->96303 96310 5f4ead 7 API calls 2 library calls 96305->96310 96307->96283 96308->96285 96309->96289 96310->96305 96311->96304 96312->96293 96313->96296 96314->96299 96316 5e195d 96315->96316 96317 5e1981 96315->96317 96324 5e13a0 96316->96324 96426 5f0242 5 API calls __Init_thread_wait 96316->96426 96424 5f0242 5 API calls __Init_thread_wait 96317->96424 96319 5e198b 96319->96316 96425 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96319->96425 96322 5e8727 96322->96324 96427 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96322->96427 96324->96128 96428 5d7510 96325->96428 96329 64f136 96330 64f15b 96329->96330 96331 5dec40 207 API calls 96329->96331 96333 64f15f 96330->96333 96479 5d9c6e 22 API calls 96330->96479 96331->96330 96333->96163 96335 5d6246 CloseHandle 96334->96335 96336 5d621e 96335->96336 96337 5d6246 CloseHandle 96336->96337 96338 5d622d messages 96337->96338 96338->96163 96340 5d625f 96339->96340 96341 5d6250 96339->96341 96340->96341 96342 5d6264 CloseHandle 96340->96342 96341->96163 96342->96341 96515 657f59 96343->96515 96345 65959b 96345->96163 96612 6498e3 96346->96612 96348 6483ea 96348->96163 96350 647469 96349->96350 96351 647474 96349->96351 96707 5db567 39 API calls 96350->96707 96354 5da961 22 API calls 96351->96354 96386 647554 96351->96386 96353 5efddb 22 API calls 96355 647587 96353->96355 96356 647495 96354->96356 96357 5efe0b 22 API calls 96355->96357 96358 5da961 22 API calls 96356->96358 96359 647598 96357->96359 96360 64749e 96358->96360 96361 5d6246 CloseHandle 96359->96361 96362 5d7510 53 API calls 96360->96362 96363 6475a3 96361->96363 96364 6474aa 96362->96364 96365 5da961 22 API calls 96363->96365 96708 5d525f 22 API calls 96364->96708 96367 6475ab 96365->96367 96368 5d6246 CloseHandle 96367->96368 96370 6475b2 96368->96370 96369 6474bf 96709 5d6350 96369->96709 96372 5d7510 53 API calls 96370->96372 96374 6475be 96372->96374 96376 5d6246 CloseHandle 96374->96376 96375 64754a 96720 5db567 39 API calls 96375->96720 96379 6475c8 96376->96379 96378 647502 96378->96375 96381 647506 96378->96381 96383 5d5745 5 API calls 96379->96383 96382 5d9cb3 22 API calls 96381->96382 96384 647513 96382->96384 96385 6475e2 96383->96385 96719 63d2c1 26 API calls 96384->96719 96388 6476de GetLastError 96385->96388 96389 6475ea 96385->96389 96386->96353 96403 6476a4 96386->96403 96390 6476f7 96388->96390 96721 5d53de 27 API calls messages 96389->96721 96392 5d6216 CloseHandle 96390->96392 96392->96403 96393 64751c 96393->96375 96394 6475f8 96722 5d53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96394->96722 96396 647645 96397 5efddb 22 API calls 96396->96397 96399 647679 96397->96399 96398 6475ff 96398->96396 96401 63ccff 4 API calls 96398->96401 96400 5da961 22 API calls 96399->96400 96402 647686 96400->96402 96401->96396 96402->96403 96723 63417d 22 API calls __fread_nolock 96402->96723 96403->96163 96405->96165 96406->96124 96408 5d9cc2 _wcslen 96407->96408 96409 5efe0b 22 API calls 96408->96409 96410 5d9cea __fread_nolock 96409->96410 96411 5efddb 22 API calls 96410->96411 96412 5d9d00 96411->96412 96412->96137 96413->96127 96414->96136 96415->96149 96416->96149 96417->96126 96418->96160 96419->96160 96420->96160 96421->96158 96422->96163 96423->96160 96424->96319 96425->96316 96426->96322 96427->96324 96429 5d7525 96428->96429 96430 5d7522 96428->96430 96431 5d752d 96429->96431 96432 5d755b 96429->96432 96451 5d9e90 96430->96451 96480 5f51c6 26 API calls 96431->96480 96434 6150f6 96432->96434 96435 5d756d 96432->96435 96442 61500f 96432->96442 96483 5f5183 26 API calls 96434->96483 96481 5efb21 51 API calls 96435->96481 96436 5d753d 96441 5efddb 22 API calls 96436->96441 96439 61510e 96439->96439 96443 5d7547 96441->96443 96445 5efe0b 22 API calls 96442->96445 96450 615088 96442->96450 96444 5d9cb3 22 API calls 96443->96444 96444->96430 96447 615058 96445->96447 96446 5efddb 22 API calls 96448 61507f 96446->96448 96447->96446 96449 5d9cb3 22 API calls 96448->96449 96449->96450 96482 5efb21 51 API calls 96450->96482 96484 5d6270 96451->96484 96453 5d9fd2 96490 5da4a1 96453->96490 96455 5d9fec 96455->96329 96458 5da6c3 22 API calls 96478 5d9eb5 96458->96478 96459 61f7c4 96513 6396e2 84 API calls __wsopen_s 96459->96513 96460 61f699 96466 5efddb 22 API calls 96460->96466 96462 5da405 96462->96455 96514 6396e2 84 API calls __wsopen_s 96462->96514 96465 61f7d2 96467 5da4a1 22 API calls 96465->96467 96468 61f754 96466->96468 96469 61f7e8 96467->96469 96470 5efe0b 22 API calls 96468->96470 96469->96455 96472 5da12c __fread_nolock 96470->96472 96472->96459 96472->96462 96475 5da4a1 22 API calls 96475->96478 96476 5da0db CharUpperBuffW 96509 5da673 22 API calls 96476->96509 96478->96453 96478->96458 96478->96459 96478->96460 96478->96462 96478->96472 96478->96475 96489 5d4573 41 API calls _wcslen 96478->96489 96498 5da587 96478->96498 96503 5daec9 96478->96503 96510 5d48c8 23 API calls 96478->96510 96511 5d49bd 22 API calls __fread_nolock 96478->96511 96512 5da673 22 API calls 96478->96512 96479->96333 96480->96436 96481->96436 96482->96434 96483->96439 96485 5efe0b 22 API calls 96484->96485 96486 5d6295 96485->96486 96487 5efddb 22 API calls 96486->96487 96488 5d62a3 96487->96488 96488->96478 96489->96478 96491 5da52b 96490->96491 96497 5da4b1 __fread_nolock 96490->96497 96494 5efe0b 22 API calls 96491->96494 96492 5efddb 22 API calls 96493 5da4b8 96492->96493 96495 5da4d6 96493->96495 96496 5efddb 22 API calls 96493->96496 96494->96497 96495->96455 96496->96495 96497->96492 96499 5da59d 96498->96499 96502 5da598 __fread_nolock 96498->96502 96500 61f80f 96499->96500 96501 5efe0b 22 API calls 96499->96501 96501->96502 96502->96478 96504 5daedc 96503->96504 96508 5daed9 __fread_nolock 96503->96508 96505 5efddb 22 API calls 96504->96505 96506 5daee7 96505->96506 96507 5efe0b 22 API calls 96506->96507 96507->96508 96508->96476 96509->96478 96510->96478 96511->96478 96512->96478 96513->96465 96514->96455 96516 5d7510 53 API calls 96515->96516 96517 657f90 96516->96517 96540 657fd5 messages 96517->96540 96553 658cd3 96517->96553 96519 658281 96520 65844f 96519->96520 96524 65828f 96519->96524 96594 658ee4 60 API calls 96520->96594 96523 65845e 96523->96524 96525 65846a 96523->96525 96566 657e86 96524->96566 96525->96540 96526 5d7510 53 API calls 96542 658049 96526->96542 96531 6582c8 96581 5efc70 96531->96581 96534 658302 96588 5d63eb 22 API calls 96534->96588 96535 6582e8 96587 64359c 82 API calls __wsopen_s 96535->96587 96538 6582f3 GetCurrentProcess TerminateProcess 96538->96534 96539 658311 96589 5d6a50 22 API calls 96539->96589 96540->96345 96542->96519 96542->96526 96542->96540 96585 63417d 22 API calls __fread_nolock 96542->96585 96586 65851d 42 API calls _strftime 96542->96586 96543 65832a 96551 658352 96543->96551 96590 5e04f0 22 API calls 96543->96590 96545 6584c5 96545->96540 96549 6584d9 FreeLibrary 96545->96549 96546 658341 96591 658b7b 75 API calls 96546->96591 96549->96540 96551->96545 96592 5e04f0 22 API calls 96551->96592 96593 5daceb 23 API calls messages 96551->96593 96595 658b7b 75 API calls 96551->96595 96554 5daec9 22 API calls 96553->96554 96555 658cee CharLowerBuffW 96554->96555 96596 638e54 96555->96596 96559 5da961 22 API calls 96560 658d2a 96559->96560 96603 5d6d25 22 API calls __fread_nolock 96560->96603 96562 658d3e 96604 5d93b2 96562->96604 96564 658e5e _wcslen 96564->96542 96565 658d48 _wcslen 96565->96564 96608 65851d 42 API calls _strftime 96565->96608 96567 657ea1 96566->96567 96568 657eec 96566->96568 96569 5efe0b 22 API calls 96567->96569 96572 659096 96568->96572 96570 657ec3 96569->96570 96570->96568 96571 5efddb 22 API calls 96570->96571 96571->96570 96573 6592ab messages 96572->96573 96579 6590ba _strcat _wcslen 96572->96579 96573->96531 96574 5db567 39 API calls 96574->96579 96575 5db38f 39 API calls 96575->96579 96576 5db6b5 39 API calls 96576->96579 96577 5d7510 53 API calls 96577->96579 96578 5fea0c 21 API calls ___std_exception_copy 96578->96579 96579->96573 96579->96574 96579->96575 96579->96576 96579->96577 96579->96578 96611 63efae 24 API calls _wcslen 96579->96611 96583 5efc85 96581->96583 96582 5efd1d VirtualProtect 96584 5efceb 96582->96584 96583->96582 96583->96584 96584->96534 96584->96535 96585->96542 96586->96542 96587->96538 96588->96539 96589->96543 96590->96546 96591->96551 96592->96551 96593->96551 96594->96523 96595->96551 96597 638e74 _wcslen 96596->96597 96598 638f63 96597->96598 96601 638ea9 96597->96601 96602 638f68 96597->96602 96598->96559 96598->96565 96601->96598 96609 5ece60 41 API calls 96601->96609 96602->96598 96610 5ece60 41 API calls 96602->96610 96603->96562 96605 5d93c0 96604->96605 96606 5d93c9 __fread_nolock 96604->96606 96605->96606 96607 5daec9 22 API calls 96605->96607 96606->96565 96606->96606 96607->96606 96608->96564 96609->96601 96610->96602 96611->96579 96613 649902 96612->96613 96614 6499e8 96612->96614 96615 5efddb 22 API calls 96613->96615 96681 649caa 39 API calls 96614->96681 96617 649909 96615->96617 96618 5efe0b 22 API calls 96617->96618 96620 64991a 96618->96620 96619 6499ca 96619->96348 96621 5d6246 CloseHandle 96620->96621 96623 649925 96621->96623 96622 649ac5 96663 641e96 96622->96663 96625 5da961 22 API calls 96623->96625 96629 64992d 96625->96629 96626 649acc 96667 63ccff 96626->96667 96627 6499a2 96627->96619 96627->96622 96628 649a33 96627->96628 96630 5d7510 53 API calls 96628->96630 96631 5d6246 CloseHandle 96629->96631 96644 649a3a 96630->96644 96632 649934 96631->96632 96635 5d7510 53 API calls 96632->96635 96634 649abb 96693 63cd57 30 API calls 96634->96693 96638 649940 96635->96638 96636 649a6e 96639 5d6270 22 API calls 96636->96639 96640 5d6246 CloseHandle 96638->96640 96642 649a7e 96639->96642 96643 64994a 96640->96643 96641 5d6246 CloseHandle 96645 649b1e 96641->96645 96646 649a8e 96642->96646 96682 5da8c7 22 API calls __fread_nolock 96642->96682 96671 5d5745 96643->96671 96644->96634 96644->96636 96649 5d6216 CloseHandle 96645->96649 96683 5d33c6 96646->96683 96649->96619 96652 6499c2 96655 5d6216 CloseHandle 96652->96655 96653 64995d 96679 5d53de 27 API calls messages 96653->96679 96655->96619 96657 649aa8 96657->96619 96657->96641 96659 64996b 96680 5d53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96659->96680 96661 649972 96661->96627 96662 63ccff 4 API calls 96661->96662 96662->96627 96664 641e9f 96663->96664 96666 641ea4 96663->96666 96694 640f67 24 API calls __fread_nolock 96664->96694 96666->96626 96668 63cd19 WriteFile 96667->96668 96669 63cd0e 96667->96669 96668->96657 96695 63cc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96669->96695 96672 5d575c CreateFileW 96671->96672 96673 614035 96671->96673 96674 5d577b 96672->96674 96673->96674 96675 61403b CreateFileW 96673->96675 96674->96652 96674->96653 96675->96674 96676 614063 96675->96676 96696 5d54c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96676->96696 96678 61406e 96678->96674 96679->96659 96680->96661 96681->96627 96682->96646 96684 5d33dd 96683->96684 96685 6130bb 96683->96685 96697 5d33ee 96684->96697 96687 5efddb 22 API calls 96685->96687 96689 6130c5 _wcslen 96687->96689 96688 5d33e8 96692 63cd57 30 API calls 96688->96692 96690 5efe0b 22 API calls 96689->96690 96691 6130fe __fread_nolock 96690->96691 96692->96657 96693->96657 96694->96666 96695->96668 96696->96678 96698 5d33fe _wcslen 96697->96698 96699 61311d 96698->96699 96700 5d3411 96698->96700 96702 5efddb 22 API calls 96699->96702 96701 5da587 22 API calls 96700->96701 96703 5d341e __fread_nolock 96701->96703 96704 613127 96702->96704 96703->96688 96705 5efe0b 22 API calls 96704->96705 96706 613157 __fread_nolock 96705->96706 96707->96351 96708->96369 96710 614a51 96709->96710 96711 5d6362 96709->96711 96734 5d4a88 22 API calls __fread_nolock 96710->96734 96724 5d6373 96711->96724 96714 614a5b 96716 614a67 96714->96716 96735 5da8c7 22 API calls __fread_nolock 96714->96735 96715 5d636e 96715->96375 96718 63d4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 96715->96718 96718->96378 96719->96393 96720->96386 96721->96394 96722->96398 96723->96403 96725 5d63b6 __fread_nolock 96724->96725 96726 5d6382 96724->96726 96725->96715 96726->96725 96727 5d63a9 96726->96727 96728 614a82 96726->96728 96730 5da587 22 API calls 96727->96730 96729 5efddb 22 API calls 96728->96729 96731 614a91 96729->96731 96730->96725 96732 5efe0b 22 API calls 96731->96732 96733 614ac5 __fread_nolock 96732->96733 96734->96714 96735->96716 96737 5dae01 96736->96737 96740 5dae1c messages 96736->96740 96738 5daec9 22 API calls 96737->96738 96739 5dae09 CharUpperBuffW 96738->96739 96739->96740 96740->96175 96742 5dacae 96741->96742 96743 5dacd1 96742->96743 96772 64359c 82 API calls __wsopen_s 96742->96772 96743->96192 96746 61fadb 96745->96746 96747 5dad92 96745->96747 96748 5efddb 22 API calls 96747->96748 96749 5dad99 96748->96749 96773 5dadcd 96749->96773 96752->96224 96753->96228 96754->96228 96755->96180 96756->96216 96757->96194 96758->96216 96759->96216 96760->96192 96761->96192 96762->96192 96763->96192 96764->96192 96765->96192 96766->96209 96767->96216 96768->96213 96769->96214 96770->96223 96771->96216 96772->96743 96777 5daddd 96773->96777 96774 5dadb6 96774->96192 96775 5efddb 22 API calls 96775->96777 96776 5da961 22 API calls 96776->96777 96777->96774 96777->96775 96777->96776 96779 5dadcd 22 API calls 96777->96779 96780 5da8c7 22 API calls __fread_nolock 96777->96780 96779->96777 96780->96777 96781->96254 96782->96254 96783->96251 96784->96251 96785->96251 96786->96251 96787->96255 96788->96251 96789 5df7bf 96790 5dfcb6 96789->96790 96791 5df7d3 96789->96791 96826 5daceb 23 API calls messages 96790->96826 96793 5dfcc2 96791->96793 96794 5efddb 22 API calls 96791->96794 96827 5daceb 23 API calls messages 96793->96827 96796 5df7e5 96794->96796 96796->96793 96797 5df83e 96796->96797 96798 5dfd3d 96796->96798 96800 5e1310 207 API calls 96797->96800 96822 5ded9d messages 96797->96822 96828 641155 22 API calls 96798->96828 96821 5dec76 messages 96800->96821 96802 5dfef7 96802->96822 96830 5da8c7 22 API calls __fread_nolock 96802->96830 96804 624b0b 96832 64359c 82 API calls __wsopen_s 96804->96832 96805 624600 96805->96822 96829 5da8c7 22 API calls __fread_nolock 96805->96829 96810 5da8c7 22 API calls 96810->96821 96812 5dfbe3 96814 624bdc 96812->96814 96812->96822 96823 5df3ae messages 96812->96823 96813 5da961 22 API calls 96813->96821 96833 64359c 82 API calls __wsopen_s 96814->96833 96815 5f0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96815->96821 96817 624beb 96834 64359c 82 API calls __wsopen_s 96817->96834 96818 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96818->96821 96819 5f00a3 29 API calls pre_c_initialization 96819->96821 96820 5efddb 22 API calls 96820->96821 96821->96802 96821->96804 96821->96805 96821->96810 96821->96812 96821->96813 96821->96815 96821->96817 96821->96818 96821->96819 96821->96820 96821->96822 96821->96823 96824 5e01e0 207 API calls 2 library calls 96821->96824 96825 5e06a0 41 API calls messages 96821->96825 96823->96822 96831 64359c 82 API calls __wsopen_s 96823->96831 96824->96821 96825->96821 96826->96793 96827->96798 96828->96822 96829->96822 96830->96822 96831->96822 96832->96822 96833->96817 96834->96822 96835 623a41 96839 6410c0 96835->96839 96837 623a4c 96838 6410c0 53 API calls 96837->96838 96838->96837 96840 6410fa 96839->96840 96845 6410cd 96839->96845 96840->96837 96841 6410fc 96851 5efa11 53 API calls 96841->96851 96843 641101 96844 5d7510 53 API calls 96843->96844 96846 641108 96844->96846 96845->96840 96845->96841 96845->96843 96848 6410f4 96845->96848 96847 5d6350 22 API calls 96846->96847 96847->96840 96850 5db270 39 API calls 96848->96850 96850->96840 96851->96843 96852 5f03fb 96853 5f0407 ___BuildCatchObject 96852->96853 96881 5efeb1 96853->96881 96855 5f040e 96856 5f0561 96855->96856 96859 5f0438 96855->96859 96908 5f083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96856->96908 96858 5f0568 96909 5f4e52 28 API calls _abort 96858->96909 96870 5f0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96859->96870 96892 60247d 96859->96892 96861 5f056e 96910 5f4e04 28 API calls _abort 96861->96910 96865 5f0576 96866 5f0457 96868 5f04d8 96900 5f0959 96868->96900 96870->96868 96904 5f4e1a 38 API calls 2 library calls 96870->96904 96872 5f04de 96873 5f04f3 96872->96873 96905 5f0992 GetModuleHandleW 96873->96905 96875 5f04fa 96875->96858 96876 5f04fe 96875->96876 96877 5f0507 96876->96877 96906 5f4df5 28 API calls _abort 96876->96906 96907 5f0040 13 API calls 2 library calls 96877->96907 96880 5f050f 96880->96866 96882 5efeba 96881->96882 96911 5f0698 IsProcessorFeaturePresent 96882->96911 96884 5efec6 96912 5f2c94 10 API calls 3 library calls 96884->96912 96886 5efecb 96891 5efecf 96886->96891 96913 602317 96886->96913 96889 5efee6 96889->96855 96891->96855 96893 602494 96892->96893 96894 5f0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96893->96894 96895 5f0451 96894->96895 96895->96866 96896 602421 96895->96896 96899 602450 96896->96899 96897 5f0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96898 602479 96897->96898 96898->96870 96899->96897 96964 5f2340 96900->96964 96903 5f097f 96903->96872 96904->96868 96905->96875 96906->96877 96907->96880 96908->96858 96909->96861 96910->96865 96911->96884 96912->96886 96917 60d1f6 96913->96917 96916 5f2cbd 8 API calls 3 library calls 96916->96891 96920 60d213 96917->96920 96921 60d20f 96917->96921 96919 5efed8 96919->96889 96919->96916 96920->96921 96923 604bfb 96920->96923 96935 5f0a8c 96921->96935 96924 604c07 ___BuildCatchObject 96923->96924 96942 602f5e EnterCriticalSection 96924->96942 96926 604c0e 96943 6050af 96926->96943 96928 604c1d 96934 604c2c 96928->96934 96956 604a8f 29 API calls 96928->96956 96931 604c27 96957 604b45 GetStdHandle GetFileType 96931->96957 96932 604c3d __wsopen_s 96932->96920 96958 604c48 LeaveCriticalSection _abort 96934->96958 96936 5f0a97 IsProcessorFeaturePresent 96935->96936 96937 5f0a95 96935->96937 96939 5f0c5d 96936->96939 96937->96919 96963 5f0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96939->96963 96941 5f0d40 96941->96919 96942->96926 96944 6050bb ___BuildCatchObject 96943->96944 96945 6050c8 96944->96945 96946 6050df 96944->96946 96960 5ff2d9 20 API calls _abort 96945->96960 96959 602f5e EnterCriticalSection 96946->96959 96949 6050cd 96961 6027ec 26 API calls ___std_exception_copy 96949->96961 96951 605117 96962 60513e LeaveCriticalSection _abort 96951->96962 96952 6050d7 __wsopen_s 96952->96928 96954 605000 __wsopen_s 21 API calls 96955 6050eb 96954->96955 96955->96951 96955->96954 96956->96931 96957->96934 96958->96932 96959->96955 96960->96949 96961->96952 96962->96952 96963->96941 96965 5f096c GetStartupInfoW 96964->96965 96965->96903 96966 612ba5 96967 5d2b25 96966->96967 96968 612baf 96966->96968 96994 5d2b83 7 API calls 96967->96994 97009 5d3a5a 96968->97009 96972 612bb8 96974 5d9cb3 22 API calls 96972->96974 96975 612bc6 96974->96975 96977 612bf5 96975->96977 96978 612bce 96975->96978 96976 5d2b2f 96987 5d2b44 96976->96987 96998 5d3837 96976->96998 96979 5d33c6 22 API calls 96977->96979 96981 5d33c6 22 API calls 96978->96981 96983 612bf1 GetForegroundWindow ShellExecuteW 96979->96983 96982 612bd9 96981->96982 96984 5d6350 22 API calls 96982->96984 96989 612c26 96983->96989 96988 612be7 96984->96988 96986 5d2b5f 96991 5d2b66 SetCurrentDirectoryW 96986->96991 96987->96986 97008 5d30f2 Shell_NotifyIconW ___scrt_fastfail 96987->97008 96992 5d33c6 22 API calls 96988->96992 96989->96986 96993 5d2b7a 96991->96993 96992->96983 97016 5d2cd4 7 API calls 96994->97016 96996 5d2b2a 96997 5d2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96996->96997 96997->96976 96999 5d3862 ___scrt_fastfail 96998->96999 97017 5d4212 96999->97017 97002 5d38e8 97004 613386 Shell_NotifyIconW 97002->97004 97005 5d3906 Shell_NotifyIconW 97002->97005 97021 5d3923 97005->97021 97007 5d391c 97007->96987 97008->96986 97058 611f50 97009->97058 97012 5d9cb3 22 API calls 97013 5d3a8d 97012->97013 97060 5d3aa2 97013->97060 97015 5d3a97 97015->96972 97016->96996 97018 6135a4 97017->97018 97019 5d38b7 97017->97019 97018->97019 97020 6135ad DestroyIcon 97018->97020 97019->97002 97043 63c874 42 API calls _strftime 97019->97043 97020->97019 97022 5d393f 97021->97022 97023 5d3a13 97021->97023 97024 5d6270 22 API calls 97022->97024 97023->97007 97025 5d394d 97024->97025 97026 613393 LoadStringW 97025->97026 97027 5d395a 97025->97027 97029 6133ad 97026->97029 97044 5d6b57 97027->97044 97037 5d3994 ___scrt_fastfail 97029->97037 97056 5da8c7 22 API calls __fread_nolock 97029->97056 97030 5d396f 97031 5d397c 97030->97031 97032 6133c9 97030->97032 97031->97029 97035 5d3986 97031->97035 97033 5d6350 22 API calls 97032->97033 97038 6133d7 97033->97038 97036 5d6350 22 API calls 97035->97036 97036->97037 97040 5d39f9 Shell_NotifyIconW 97037->97040 97038->97037 97039 5d33c6 22 API calls 97038->97039 97041 6133f9 97039->97041 97040->97023 97042 5d33c6 22 API calls 97041->97042 97042->97037 97043->97002 97045 614ba1 97044->97045 97046 5d6b67 _wcslen 97044->97046 97047 5d93b2 22 API calls 97045->97047 97049 5d6b7d 97046->97049 97050 5d6ba2 97046->97050 97048 614baa 97047->97048 97048->97048 97057 5d6f34 22 API calls 97049->97057 97052 5efddb 22 API calls 97050->97052 97053 5d6bae 97052->97053 97055 5efe0b 22 API calls 97053->97055 97054 5d6b85 __fread_nolock 97054->97030 97055->97054 97056->97037 97057->97054 97059 5d3a67 GetModuleFileNameW 97058->97059 97059->97012 97061 611f50 __wsopen_s 97060->97061 97062 5d3aaf GetFullPathNameW 97061->97062 97063 5d3ace 97062->97063 97064 5d3ae9 97062->97064 97065 5d6b57 22 API calls 97063->97065 97074 5da6c3 97064->97074 97067 5d3ada 97065->97067 97070 5d37a0 97067->97070 97071 5d37ae 97070->97071 97072 5d93b2 22 API calls 97071->97072 97073 5d37c2 97072->97073 97073->97015 97075 5da6dd 97074->97075 97076 5da6d0 97074->97076 97077 5efddb 22 API calls 97075->97077 97076->97067 97078 5da6e7 97077->97078 97079 5efe0b 22 API calls 97078->97079 97079->97076 97080 5d1098 97085 5d42de 97080->97085 97084 5d10a7 97086 5da961 22 API calls 97085->97086 97087 5d42f5 GetVersionExW 97086->97087 97088 5d6b57 22 API calls 97087->97088 97089 5d4342 97088->97089 97090 5d93b2 22 API calls 97089->97090 97102 5d4378 97089->97102 97091 5d436c 97090->97091 97093 5d37a0 22 API calls 97091->97093 97092 5d441b GetCurrentProcess IsWow64Process 97094 5d4437 97092->97094 97093->97102 97095 5d444f LoadLibraryA 97094->97095 97096 613824 GetSystemInfo 97094->97096 97097 5d449c GetSystemInfo 97095->97097 97098 5d4460 GetProcAddress 97095->97098 97100 5d4476 97097->97100 97098->97097 97099 5d4470 GetNativeSystemInfo 97098->97099 97099->97100 97103 5d447a FreeLibrary 97100->97103 97104 5d109d 97100->97104 97101 6137df 97102->97092 97102->97101 97103->97104 97105 5f00a3 29 API calls __onexit 97104->97105 97105->97084 97106 5d105b 97111 5d344d 97106->97111 97108 5d106a 97142 5f00a3 29 API calls __onexit 97108->97142 97110 5d1074 97112 5d345d __wsopen_s 97111->97112 97113 5da961 22 API calls 97112->97113 97114 5d3513 97113->97114 97115 5d3a5a 24 API calls 97114->97115 97116 5d351c 97115->97116 97143 5d3357 97116->97143 97119 5d33c6 22 API calls 97120 5d3535 97119->97120 97149 5d515f 97120->97149 97123 5da961 22 API calls 97124 5d354d 97123->97124 97125 5da6c3 22 API calls 97124->97125 97126 5d3556 RegOpenKeyExW 97125->97126 97127 613176 RegQueryValueExW 97126->97127 97131 5d3578 97126->97131 97128 613193 97127->97128 97129 61320c RegCloseKey 97127->97129 97130 5efe0b 22 API calls 97128->97130 97129->97131 97140 61321e _wcslen 97129->97140 97132 6131ac 97130->97132 97131->97108 97155 5d5722 97132->97155 97135 6131d4 97136 5d6b57 22 API calls 97135->97136 97137 6131ee messages 97136->97137 97137->97129 97138 5d9cb3 22 API calls 97138->97140 97139 5d515f 22 API calls 97139->97140 97140->97131 97140->97138 97140->97139 97141 5d4c6d 22 API calls 97140->97141 97141->97140 97142->97110 97144 611f50 __wsopen_s 97143->97144 97145 5d3364 GetFullPathNameW 97144->97145 97146 5d3386 97145->97146 97147 5d6b57 22 API calls 97146->97147 97148 5d33a4 97147->97148 97148->97119 97150 5d516e 97149->97150 97154 5d518f __fread_nolock 97149->97154 97152 5efe0b 22 API calls 97150->97152 97151 5efddb 22 API calls 97153 5d3544 97151->97153 97152->97154 97153->97123 97154->97151 97156 5efddb 22 API calls 97155->97156 97157 5d5734 RegQueryValueExW 97156->97157 97157->97135 97157->97137 97158 111c398 97172 1119fe8 97158->97172 97160 111c44e 97175 111c288 97160->97175 97162 111c477 CreateFileW 97164 111c4c6 97162->97164 97165 111c4cb 97162->97165 97165->97164 97166 111c4e2 VirtualAlloc 97165->97166 97166->97164 97167 111c500 ReadFile 97166->97167 97167->97164 97168 111c51b 97167->97168 97169 111b288 13 API calls 97168->97169 97170 111c54e 97169->97170 97171 111c571 ExitProcess 97170->97171 97171->97164 97178 111d478 GetPEB 97172->97178 97174 111a673 97174->97160 97176 111c291 Sleep 97175->97176 97177 111c29f 97176->97177 97179 111d4a2 97178->97179 97179->97174 97180 5d2e37 97181 5da961 22 API calls 97180->97181 97182 5d2e4d 97181->97182 97259 5d4ae3 97182->97259 97184 5d2e6b 97185 5d3a5a 24 API calls 97184->97185 97186 5d2e7f 97185->97186 97187 5d9cb3 22 API calls 97186->97187 97188 5d2e8c 97187->97188 97273 5d4ecb 97188->97273 97191 5d2ead 97295 5da8c7 22 API calls __fread_nolock 97191->97295 97192 612cb0 97313 642cf9 97192->97313 97194 612cc3 97196 612ccf 97194->97196 97339 5d4f39 97194->97339 97200 5d4f39 68 API calls 97196->97200 97197 5d2ec3 97296 5d6f88 22 API calls 97197->97296 97202 612ce5 97200->97202 97201 5d2ecf 97203 5d9cb3 22 API calls 97201->97203 97345 5d3084 22 API calls 97202->97345 97204 5d2edc 97203->97204 97297 5da81b 41 API calls 97204->97297 97207 5d2eec 97209 5d9cb3 22 API calls 97207->97209 97208 612d02 97346 5d3084 22 API calls 97208->97346 97210 5d2f12 97209->97210 97298 5da81b 41 API calls 97210->97298 97213 612d1e 97214 5d3a5a 24 API calls 97213->97214 97215 612d44 97214->97215 97347 5d3084 22 API calls 97215->97347 97216 5d2f21 97219 5da961 22 API calls 97216->97219 97218 612d50 97348 5da8c7 22 API calls __fread_nolock 97218->97348 97221 5d2f3f 97219->97221 97299 5d3084 22 API calls 97221->97299 97222 612d5e 97349 5d3084 22 API calls 97222->97349 97225 5d2f4b 97300 5f4a28 40 API calls 3 library calls 97225->97300 97226 612d6d 97350 5da8c7 22 API calls __fread_nolock 97226->97350 97228 5d2f59 97228->97202 97229 5d2f63 97228->97229 97301 5f4a28 40 API calls 3 library calls 97229->97301 97232 5d2f6e 97232->97208 97234 5d2f78 97232->97234 97233 612d83 97351 5d3084 22 API calls 97233->97351 97302 5f4a28 40 API calls 3 library calls 97234->97302 97237 612d90 97238 5d2f83 97238->97213 97239 5d2f8d 97238->97239 97303 5f4a28 40 API calls 3 library calls 97239->97303 97241 5d2f98 97242 5d2fdc 97241->97242 97304 5d3084 22 API calls 97241->97304 97242->97226 97243 5d2fe8 97242->97243 97243->97237 97307 5d63eb 22 API calls 97243->97307 97246 5d2fbf 97305 5da8c7 22 API calls __fread_nolock 97246->97305 97247 5d2ff8 97308 5d6a50 22 API calls 97247->97308 97250 5d2fcd 97306 5d3084 22 API calls 97250->97306 97251 5d3006 97309 5d70b0 23 API calls 97251->97309 97256 5d3021 97257 5d3065 97256->97257 97310 5d6f88 22 API calls 97256->97310 97311 5d70b0 23 API calls 97256->97311 97312 5d3084 22 API calls 97256->97312 97260 5d4af0 __wsopen_s 97259->97260 97261 5d6b57 22 API calls 97260->97261 97262 5d4b22 97260->97262 97261->97262 97269 5d4b58 97262->97269 97352 5d4c6d 97262->97352 97264 5d4c6d 22 API calls 97264->97269 97265 5d9cb3 22 API calls 97267 5d4c52 97265->97267 97266 5d9cb3 22 API calls 97266->97269 97268 5d515f 22 API calls 97267->97268 97271 5d4c5e 97268->97271 97269->97264 97269->97266 97270 5d515f 22 API calls 97269->97270 97272 5d4c29 97269->97272 97270->97269 97271->97184 97272->97265 97272->97271 97355 5d4e90 LoadLibraryA 97273->97355 97278 5d4ef6 LoadLibraryExW 97363 5d4e59 LoadLibraryA 97278->97363 97279 613ccf 97281 5d4f39 68 API calls 97279->97281 97283 613cd6 97281->97283 97285 5d4e59 3 API calls 97283->97285 97286 613cde 97285->97286 97385 5d50f5 97286->97385 97287 5d4f20 97287->97286 97288 5d4f2c 97287->97288 97290 5d4f39 68 API calls 97288->97290 97292 5d2ea5 97290->97292 97292->97191 97292->97192 97294 613d05 97295->97197 97296->97201 97297->97207 97298->97216 97299->97225 97300->97228 97301->97232 97302->97238 97303->97241 97304->97246 97305->97250 97306->97242 97307->97247 97308->97251 97309->97256 97310->97256 97311->97256 97312->97256 97314 642d15 97313->97314 97315 5d511f 64 API calls 97314->97315 97316 642d29 97315->97316 97516 642e66 97316->97516 97319 5d50f5 40 API calls 97320 642d56 97319->97320 97321 5d50f5 40 API calls 97320->97321 97322 642d66 97321->97322 97323 5d50f5 40 API calls 97322->97323 97324 642d81 97323->97324 97325 5d50f5 40 API calls 97324->97325 97326 642d9c 97325->97326 97327 5d511f 64 API calls 97326->97327 97328 642db3 97327->97328 97329 5fea0c ___std_exception_copy 21 API calls 97328->97329 97330 642dba 97329->97330 97331 5fea0c ___std_exception_copy 21 API calls 97330->97331 97332 642dc4 97331->97332 97333 5d50f5 40 API calls 97332->97333 97334 642dd8 97333->97334 97335 6428fe 27 API calls 97334->97335 97336 642dee 97335->97336 97337 642d3f 97336->97337 97522 6422ce 79 API calls 97336->97522 97337->97194 97340 5d4f43 97339->97340 97344 5d4f4a 97339->97344 97523 5fe678 97340->97523 97342 5d4f59 97342->97196 97343 5d4f6a FreeLibrary 97343->97342 97344->97342 97344->97343 97345->97208 97346->97213 97347->97218 97348->97222 97349->97226 97350->97233 97351->97237 97353 5daec9 22 API calls 97352->97353 97354 5d4c78 97353->97354 97354->97262 97356 5d4ea8 GetProcAddress 97355->97356 97357 5d4ec6 97355->97357 97358 5d4eb8 97356->97358 97360 5fe5eb 97357->97360 97358->97357 97359 5d4ebf FreeLibrary 97358->97359 97359->97357 97393 5fe52a 97360->97393 97362 5d4eea 97362->97278 97362->97279 97364 5d4e8d 97363->97364 97365 5d4e6e GetProcAddress 97363->97365 97368 5d4f80 97364->97368 97366 5d4e7e 97365->97366 97366->97364 97367 5d4e86 FreeLibrary 97366->97367 97367->97364 97369 5efe0b 22 API calls 97368->97369 97370 5d4f95 97369->97370 97371 5d5722 22 API calls 97370->97371 97372 5d4fa1 __fread_nolock 97371->97372 97373 5d50a5 97372->97373 97374 613d1d 97372->97374 97384 5d4fdc 97372->97384 97445 5d42a2 CreateStreamOnHGlobal 97373->97445 97456 64304d 74 API calls 97374->97456 97377 613d22 97379 5d511f 64 API calls 97377->97379 97378 5d50f5 40 API calls 97378->97384 97380 613d45 97379->97380 97381 5d50f5 40 API calls 97380->97381 97383 5d506e messages 97381->97383 97383->97287 97384->97377 97384->97378 97384->97383 97451 5d511f 97384->97451 97386 5d5107 97385->97386 97389 613d70 97385->97389 97478 5fe8c4 97386->97478 97390 6428fe 97499 64274e 97390->97499 97392 642919 97392->97294 97395 5fe536 ___BuildCatchObject 97393->97395 97394 5fe544 97418 5ff2d9 20 API calls _abort 97394->97418 97395->97394 97398 5fe574 97395->97398 97397 5fe549 97419 6027ec 26 API calls ___std_exception_copy 97397->97419 97400 5fe579 97398->97400 97401 5fe586 97398->97401 97420 5ff2d9 20 API calls _abort 97400->97420 97410 608061 97401->97410 97404 5fe58f 97405 5fe595 97404->97405 97406 5fe5a2 97404->97406 97421 5ff2d9 20 API calls _abort 97405->97421 97422 5fe5d4 LeaveCriticalSection __fread_nolock 97406->97422 97407 5fe554 __wsopen_s 97407->97362 97411 60806d ___BuildCatchObject 97410->97411 97423 602f5e EnterCriticalSection 97411->97423 97413 60807b 97424 6080fb 97413->97424 97417 6080ac __wsopen_s 97417->97404 97418->97397 97419->97407 97420->97407 97421->97407 97422->97407 97423->97413 97428 60811e 97424->97428 97425 608088 97437 6080b7 97425->97437 97426 608177 97427 604c7d pre_c_initialization 20 API calls 97426->97427 97430 608180 97427->97430 97428->97425 97428->97426 97440 5f918d EnterCriticalSection 97428->97440 97441 5f91a1 LeaveCriticalSection 97428->97441 97431 6029c8 _free 20 API calls 97430->97431 97432 608189 97431->97432 97432->97425 97442 603405 11 API calls 2 library calls 97432->97442 97434 6081a8 97443 5f918d EnterCriticalSection 97434->97443 97444 602fa6 LeaveCriticalSection 97437->97444 97439 6080be 97439->97417 97440->97428 97441->97428 97442->97434 97443->97425 97444->97439 97446 5d42bc FindResourceExW 97445->97446 97450 5d42d9 97445->97450 97447 6135ba LoadResource 97446->97447 97446->97450 97448 6135cf SizeofResource 97447->97448 97447->97450 97449 6135e3 LockResource 97448->97449 97448->97450 97449->97450 97450->97384 97452 5d512e 97451->97452 97455 613d90 97451->97455 97457 5fece3 97452->97457 97456->97377 97460 5feaaa 97457->97460 97459 5d513c 97459->97384 97463 5feab6 ___BuildCatchObject 97460->97463 97461 5feac2 97473 5ff2d9 20 API calls _abort 97461->97473 97463->97461 97464 5feae8 97463->97464 97475 5f918d EnterCriticalSection 97464->97475 97465 5feac7 97474 6027ec 26 API calls ___std_exception_copy 97465->97474 97468 5feaf4 97476 5fec0a 62 API calls 2 library calls 97468->97476 97470 5feb08 97477 5feb27 LeaveCriticalSection __fread_nolock 97470->97477 97472 5fead2 __wsopen_s 97472->97459 97473->97465 97474->97472 97475->97468 97476->97470 97477->97472 97481 5fe8e1 97478->97481 97480 5d5118 97480->97390 97482 5fe8ed ___BuildCatchObject 97481->97482 97483 5fe92d 97482->97483 97484 5fe900 ___scrt_fastfail 97482->97484 97485 5fe925 __wsopen_s 97482->97485 97496 5f918d EnterCriticalSection 97483->97496 97494 5ff2d9 20 API calls _abort 97484->97494 97485->97480 97487 5fe937 97497 5fe6f8 38 API calls 4 library calls 97487->97497 97490 5fe91a 97495 6027ec 26 API calls ___std_exception_copy 97490->97495 97491 5fe94e 97498 5fe96c LeaveCriticalSection __fread_nolock 97491->97498 97494->97490 97495->97485 97496->97487 97497->97491 97498->97485 97502 5fe4e8 97499->97502 97501 64275d 97501->97392 97505 5fe469 97502->97505 97504 5fe505 97504->97501 97506 5fe48c 97505->97506 97507 5fe478 97505->97507 97512 5fe488 __alldvrm 97506->97512 97515 60333f 11 API calls 2 library calls 97506->97515 97513 5ff2d9 20 API calls _abort 97507->97513 97509 5fe47d 97514 6027ec 26 API calls ___std_exception_copy 97509->97514 97512->97504 97513->97509 97514->97512 97515->97512 97521 642e7a 97516->97521 97517 642d3b 97517->97319 97517->97337 97518 5d50f5 40 API calls 97518->97521 97519 6428fe 27 API calls 97519->97521 97520 5d511f 64 API calls 97520->97521 97521->97517 97521->97518 97521->97519 97521->97520 97522->97337 97524 5fe684 ___BuildCatchObject 97523->97524 97525 5fe6aa 97524->97525 97526 5fe695 97524->97526 97535 5fe6a5 __wsopen_s 97525->97535 97536 5f918d EnterCriticalSection 97525->97536 97553 5ff2d9 20 API calls _abort 97526->97553 97529 5fe69a 97554 6027ec 26 API calls ___std_exception_copy 97529->97554 97530 5fe6c6 97537 5fe602 97530->97537 97533 5fe6d1 97555 5fe6ee LeaveCriticalSection __fread_nolock 97533->97555 97535->97344 97536->97530 97538 5fe60f 97537->97538 97539 5fe624 97537->97539 97588 5ff2d9 20 API calls _abort 97538->97588 97551 5fe61f 97539->97551 97556 5fdc0b 97539->97556 97541 5fe614 97589 6027ec 26 API calls ___std_exception_copy 97541->97589 97548 5fe646 97573 60862f 97548->97573 97551->97533 97552 6029c8 _free 20 API calls 97552->97551 97553->97529 97554->97535 97555->97535 97557 5fdc1f 97556->97557 97558 5fdc23 97556->97558 97562 604d7a 97557->97562 97558->97557 97559 5fd955 __fread_nolock 26 API calls 97558->97559 97560 5fdc43 97559->97560 97590 6059be 62 API calls 4 library calls 97560->97590 97563 604d90 97562->97563 97564 5fe640 97562->97564 97563->97564 97565 6029c8 _free 20 API calls 97563->97565 97566 5fd955 97564->97566 97565->97564 97567 5fd976 97566->97567 97568 5fd961 97566->97568 97567->97548 97591 5ff2d9 20 API calls _abort 97568->97591 97570 5fd966 97592 6027ec 26 API calls ___std_exception_copy 97570->97592 97572 5fd971 97572->97548 97574 608653 97573->97574 97575 60863e 97573->97575 97577 60868e 97574->97577 97580 60867a 97574->97580 97596 5ff2c6 20 API calls _abort 97575->97596 97598 5ff2c6 20 API calls _abort 97577->97598 97579 608643 97597 5ff2d9 20 API calls _abort 97579->97597 97593 608607 97580->97593 97581 608693 97599 5ff2d9 20 API calls _abort 97581->97599 97585 5fe64c 97585->97551 97585->97552 97586 60869b 97600 6027ec 26 API calls ___std_exception_copy 97586->97600 97588->97541 97589->97551 97590->97557 97591->97570 97592->97572 97601 608585 97593->97601 97595 60862b 97595->97585 97596->97579 97597->97585 97598->97581 97599->97586 97600->97585 97602 608591 ___BuildCatchObject 97601->97602 97612 605147 EnterCriticalSection 97602->97612 97604 60859f 97605 6085d1 97604->97605 97606 6085c6 97604->97606 97613 5ff2d9 20 API calls _abort 97605->97613 97608 6086ae __wsopen_s 29 API calls 97606->97608 97609 6085cc 97608->97609 97614 6085fb LeaveCriticalSection __wsopen_s 97609->97614 97611 6085ee __wsopen_s 97611->97595 97612->97604 97613->97609 97614->97611 97615 5d3156 97618 5d3170 97615->97618 97619 5d3187 97618->97619 97620 5d318c 97619->97620 97621 5d31eb 97619->97621 97659 5d31e9 97619->97659 97624 5d3199 97620->97624 97625 5d3265 PostQuitMessage 97620->97625 97622 612dfb 97621->97622 97623 5d31f1 97621->97623 97667 5d18e2 10 API calls 97622->97667 97627 5d321d SetTimer RegisterWindowMessageW 97623->97627 97628 5d31f8 97623->97628 97630 5d31a4 97624->97630 97631 612e7c 97624->97631 97632 5d316a 97625->97632 97626 5d31d0 DefWindowProcW 97626->97632 97627->97632 97636 5d3246 CreatePopupMenu 97627->97636 97633 5d3201 KillTimer 97628->97633 97634 612d9c 97628->97634 97637 5d31ae 97630->97637 97638 612e68 97630->97638 97672 63bf30 34 API calls ___scrt_fastfail 97631->97672 97663 5d30f2 Shell_NotifyIconW ___scrt_fastfail 97633->97663 97646 612da1 97634->97646 97647 612dd7 MoveWindow 97634->97647 97635 612e1c 97668 5ee499 42 API calls 97635->97668 97636->97632 97643 5d31b9 97637->97643 97644 612e4d 97637->97644 97671 63c161 27 API calls ___scrt_fastfail 97638->97671 97650 5d31c4 97643->97650 97651 5d3253 97643->97651 97644->97626 97670 630ad7 22 API calls 97644->97670 97645 612e8e 97645->97626 97645->97632 97652 612da7 97646->97652 97653 612dc6 SetFocus 97646->97653 97647->97632 97648 5d3214 97664 5d3c50 DeleteObject DestroyWindow 97648->97664 97649 5d3263 97649->97632 97650->97626 97669 5d30f2 Shell_NotifyIconW ___scrt_fastfail 97650->97669 97665 5d326f 44 API calls ___scrt_fastfail 97651->97665 97652->97650 97654 612db0 97652->97654 97653->97632 97666 5d18e2 10 API calls 97654->97666 97659->97626 97661 612e41 97662 5d3837 49 API calls 97661->97662 97662->97659 97663->97648 97664->97632 97665->97649 97666->97632 97667->97635 97668->97650 97669->97661 97670->97659 97671->97649 97672->97645 97673 5d1033 97678 5d4c91 97673->97678 97677 5d1042 97679 5da961 22 API calls 97678->97679 97680 5d4cff 97679->97680 97686 5d3af0 97680->97686 97683 5d4d9c 97684 5d1038 97683->97684 97689 5d51f7 22 API calls __fread_nolock 97683->97689 97685 5f00a3 29 API calls __onexit 97684->97685 97685->97677 97690 5d3b1c 97686->97690 97689->97683 97691 5d3b0f 97690->97691 97692 5d3b29 97690->97692 97691->97683 97692->97691 97693 5d3b30 RegOpenKeyExW 97692->97693 97693->97691 97694 5d3b4a RegQueryValueExW 97693->97694 97695 5d3b6b 97694->97695 97696 5d3b80 RegCloseKey 97694->97696 97695->97696 97696->97691 97697 5d1cad SystemParametersInfoW 97698 5ddee5 97701 5db710 97698->97701 97702 5db72b 97701->97702 97703 620146 97702->97703 97704 6200f8 97702->97704 97725 5db750 97702->97725 97743 6558a2 207 API calls 2 library calls 97703->97743 97707 620102 97704->97707 97710 62010f 97704->97710 97704->97725 97741 655d33 207 API calls 97707->97741 97728 5dba20 97710->97728 97742 6561d0 207 API calls 2 library calls 97710->97742 97713 6203d9 97713->97713 97717 5dba4e 97718 620322 97747 655c0c 82 API calls 97718->97747 97725->97717 97725->97718 97726 5ed336 40 API calls 97725->97726 97727 5dbbe0 40 API calls 97725->97727 97725->97728 97729 5dec40 207 API calls 97725->97729 97732 5da81b 41 API calls 97725->97732 97733 5ed2f0 40 API calls 97725->97733 97734 5ea01b 207 API calls 97725->97734 97735 5f0242 5 API calls __Init_thread_wait 97725->97735 97736 5eedcd 22 API calls 97725->97736 97737 5f00a3 29 API calls __onexit 97725->97737 97738 5f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97725->97738 97739 5eee53 82 API calls 97725->97739 97740 5ee5ca 207 API calls 97725->97740 97744 5daceb 23 API calls messages 97725->97744 97745 62f6bf 23 API calls 97725->97745 97746 5da8c7 22 API calls __fread_nolock 97725->97746 97726->97725 97727->97725 97728->97717 97748 64359c 82 API calls __wsopen_s 97728->97748 97729->97725 97732->97725 97733->97725 97734->97725 97735->97725 97736->97725 97737->97725 97738->97725 97739->97725 97740->97725 97741->97710 97742->97728 97743->97725 97744->97725 97745->97725 97746->97725 97747->97728 97748->97713 97749 5d1044 97754 5d10f3 97749->97754 97751 5d104a 97790 5f00a3 29 API calls __onexit 97751->97790 97753 5d1054 97791 5d1398 97754->97791 97758 5d116a 97759 5da961 22 API calls 97758->97759 97760 5d1174 97759->97760 97761 5da961 22 API calls 97760->97761 97762 5d117e 97761->97762 97763 5da961 22 API calls 97762->97763 97764 5d1188 97763->97764 97765 5da961 22 API calls 97764->97765 97766 5d11c6 97765->97766 97767 5da961 22 API calls 97766->97767 97768 5d1292 97767->97768 97801 5d171c 97768->97801 97772 5d12c4 97773 5da961 22 API calls 97772->97773 97774 5d12ce 97773->97774 97775 5e1940 9 API calls 97774->97775 97776 5d12f9 97775->97776 97822 5d1aab 97776->97822 97778 5d1315 97779 5d1325 GetStdHandle 97778->97779 97780 612485 97779->97780 97781 5d137a 97779->97781 97780->97781 97782 61248e 97780->97782 97784 5d1387 OleInitialize 97781->97784 97783 5efddb 22 API calls 97782->97783 97785 612495 97783->97785 97784->97751 97829 64011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97785->97829 97787 61249e 97830 640944 CreateThread 97787->97830 97789 6124aa CloseHandle 97789->97781 97790->97753 97831 5d13f1 97791->97831 97794 5d13f1 22 API calls 97795 5d13d0 97794->97795 97796 5da961 22 API calls 97795->97796 97797 5d13dc 97796->97797 97798 5d6b57 22 API calls 97797->97798 97799 5d1129 97798->97799 97800 5d1bc3 6 API calls 97799->97800 97800->97758 97802 5da961 22 API calls 97801->97802 97803 5d172c 97802->97803 97804 5da961 22 API calls 97803->97804 97805 5d1734 97804->97805 97806 5da961 22 API calls 97805->97806 97807 5d174f 97806->97807 97808 5efddb 22 API calls 97807->97808 97809 5d129c 97808->97809 97810 5d1b4a 97809->97810 97811 5d1b58 97810->97811 97812 5da961 22 API calls 97811->97812 97813 5d1b63 97812->97813 97814 5da961 22 API calls 97813->97814 97815 5d1b6e 97814->97815 97816 5da961 22 API calls 97815->97816 97817 5d1b79 97816->97817 97818 5da961 22 API calls 97817->97818 97819 5d1b84 97818->97819 97820 5efddb 22 API calls 97819->97820 97821 5d1b96 RegisterWindowMessageW 97820->97821 97821->97772 97823 5d1abb 97822->97823 97824 61272d 97822->97824 97825 5efddb 22 API calls 97823->97825 97838 643209 23 API calls 97824->97838 97827 5d1ac3 97825->97827 97827->97778 97828 612738 97829->97787 97830->97789 97839 64092a 28 API calls 97830->97839 97832 5da961 22 API calls 97831->97832 97833 5d13fc 97832->97833 97834 5da961 22 API calls 97833->97834 97835 5d1404 97834->97835 97836 5da961 22 API calls 97835->97836 97837 5d13c6 97836->97837 97837->97794 97838->97828 97840 5d2de3 97841 5d2df0 __wsopen_s 97840->97841 97842 5d2e09 97841->97842 97843 612c2b ___scrt_fastfail 97841->97843 97844 5d3aa2 23 API calls 97842->97844 97846 612c47 GetOpenFileNameW 97843->97846 97845 5d2e12 97844->97845 97856 5d2da5 97845->97856 97847 612c96 97846->97847 97849 5d6b57 22 API calls 97847->97849 97851 612cab 97849->97851 97851->97851 97853 5d2e27 97874 5d44a8 97853->97874 97857 611f50 __wsopen_s 97856->97857 97858 5d2db2 GetLongPathNameW 97857->97858 97859 5d6b57 22 API calls 97858->97859 97860 5d2dda 97859->97860 97861 5d3598 97860->97861 97862 5da961 22 API calls 97861->97862 97863 5d35aa 97862->97863 97864 5d3aa2 23 API calls 97863->97864 97865 5d35b5 97864->97865 97866 5d35c0 97865->97866 97869 6132eb 97865->97869 97868 5d515f 22 API calls 97866->97868 97870 5d35cc 97868->97870 97871 61330d 97869->97871 97910 5ece60 41 API calls 97869->97910 97904 5d35f3 97870->97904 97873 5d35df 97873->97853 97875 5d4ecb 94 API calls 97874->97875 97876 5d44cd 97875->97876 97877 613833 97876->97877 97878 5d4ecb 94 API calls 97876->97878 97879 642cf9 80 API calls 97877->97879 97880 5d44e1 97878->97880 97881 613848 97879->97881 97880->97877 97882 5d44e9 97880->97882 97883 613869 97881->97883 97884 61384c 97881->97884 97886 613854 97882->97886 97887 5d44f5 97882->97887 97885 5efe0b 22 API calls 97883->97885 97888 5d4f39 68 API calls 97884->97888 97903 6138ae 97885->97903 97921 63da5a 82 API calls 97886->97921 97920 5d940c 136 API calls 2 library calls 97887->97920 97888->97886 97891 5d2e31 97892 613862 97892->97883 97893 613a5f 97898 613a67 97893->97898 97894 5d4f39 68 API calls 97894->97898 97895 5da4a1 22 API calls 97895->97903 97898->97894 97924 63989b 82 API calls __wsopen_s 97898->97924 97900 5d9cb3 22 API calls 97900->97903 97903->97893 97903->97895 97903->97898 97903->97900 97911 63967e 97903->97911 97914 640b5a 97903->97914 97922 6395ad 42 API calls _wcslen 97903->97922 97923 5d3ff7 22 API calls 97903->97923 97905 5d3605 97904->97905 97909 5d3624 __fread_nolock 97904->97909 97908 5efe0b 22 API calls 97905->97908 97906 5efddb 22 API calls 97907 5d363b 97906->97907 97907->97873 97908->97909 97909->97906 97910->97869 97912 5efe0b 22 API calls 97911->97912 97913 6396ae __fread_nolock 97912->97913 97913->97903 97913->97913 97915 640b65 97914->97915 97916 5efddb 22 API calls 97915->97916 97917 640b7c 97916->97917 97918 5d9cb3 22 API calls 97917->97918 97919 640b87 97918->97919 97919->97903 97920->97891 97921->97892 97922->97903 97923->97903 97924->97898

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 234 5d42de-5d434d call 5da961 GetVersionExW call 5d6b57 239 613617-61362a 234->239 240 5d4353 234->240 242 61362b-61362f 239->242 241 5d4355-5d4357 240->241 243 5d435d-5d43bc call 5d93b2 call 5d37a0 241->243 244 613656 241->244 245 613631 242->245 246 613632-61363e 242->246 262 6137df-6137e6 243->262 263 5d43c2-5d43c4 243->263 249 61365d-613660 244->249 245->246 246->242 248 613640-613642 246->248 248->241 251 613648-61364f 248->251 252 5d441b-5d4435 GetCurrentProcess IsWow64Process 249->252 253 613666-6136a8 249->253 251->239 255 613651 251->255 258 5d4494-5d449a 252->258 259 5d4437 252->259 253->252 256 6136ae-6136b1 253->256 255->244 260 6136b3-6136bd 256->260 261 6136db-6136e5 256->261 264 5d443d-5d4449 258->264 259->264 267 6136ca-6136d6 260->267 268 6136bf-6136c5 260->268 270 6136e7-6136f3 261->270 271 6136f8-613702 261->271 272 613806-613809 262->272 273 6137e8 262->273 263->249 269 5d43ca-5d43dd 263->269 265 5d444f-5d445e LoadLibraryA 264->265 266 613824-613828 GetSystemInfo 264->266 274 5d449c-5d44a6 GetSystemInfo 265->274 275 5d4460-5d446e GetProcAddress 265->275 267->252 268->252 276 613726-61372f 269->276 277 5d43e3-5d43e5 269->277 270->252 279 613715-613721 271->279 280 613704-613710 271->280 281 6137f4-6137fc 272->281 282 61380b-61381a 272->282 278 6137ee 273->278 284 5d4476-5d4478 274->284 275->274 283 5d4470-5d4474 GetNativeSystemInfo 275->283 287 613731-613737 276->287 288 61373c-613748 276->288 285 5d43eb-5d43ee 277->285 286 61374d-613762 277->286 278->281 279->252 280->252 281->272 282->278 289 61381c-613822 282->289 283->284 292 5d447a-5d447b FreeLibrary 284->292 293 5d4481-5d4493 284->293 294 613791-613794 285->294 295 5d43f4-5d440f 285->295 290 613764-61376a 286->290 291 61376f-61377b 286->291 287->252 288->252 289->281 290->252 291->252 292->293 294->252 296 61379a-6137c1 294->296 297 613780-61378c 295->297 298 5d4415 295->298 299 6137c3-6137c9 296->299 300 6137ce-6137da 296->300 297->252 298->252 299->252 300->252
                                                                  APIs
                                                                  • GetVersionExW.KERNEL32(?), ref: 005D430D
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                  • GetCurrentProcess.KERNEL32(?,0066CB64,00000000,?,?), ref: 005D4422
                                                                  • IsWow64Process.KERNEL32(00000000,?,?), ref: 005D4429
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 005D4454
                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 005D4466
                                                                  • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 005D4474
                                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 005D447B
                                                                  • GetSystemInfo.KERNEL32(?,?,?), ref: 005D44A0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                  • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                  • API String ID: 3290436268-3101561225
                                                                  • Opcode ID: c7dfaecc9cbb2905997f6da12a6d14750935640c66cee1fe0572f76e40fb8831
                                                                  • Instruction ID: 59e376a22e45d12bb2042e10b5a884806188669c55b1463747b93ac5f6100ced
                                                                  • Opcode Fuzzy Hash: c7dfaecc9cbb2905997f6da12a6d14750935640c66cee1fe0572f76e40fb8831
                                                                  • Instruction Fuzzy Hash: 3BA1916190A6E0DFCF21EF6D78401E57FE77B27340F08689AD0819BB62D6706988CF65

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 803 5d42a2-5d42ba CreateStreamOnHGlobal 804 5d42bc-5d42d3 FindResourceExW 803->804 805 5d42da-5d42dd 803->805 806 5d42d9 804->806 807 6135ba-6135c9 LoadResource 804->807 806->805 807->806 808 6135cf-6135dd SizeofResource 807->808 808->806 809 6135e3-6135ee LockResource 808->809 809->806 810 6135f4-613612 809->810 810->806
                                                                  APIs
                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,005D50AA,?,?,00000000,00000000), ref: 005D42B2
                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005D50AA,?,?,00000000,00000000), ref: 005D42C9
                                                                  • LoadResource.KERNEL32(?,00000000,?,?,005D50AA,?,?,00000000,00000000,?,?,?,?,?,?,005D4F20), ref: 006135BE
                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,005D50AA,?,?,00000000,00000000,?,?,?,?,?,?,005D4F20), ref: 006135D3
                                                                  • LockResource.KERNEL32(005D50AA,?,?,005D50AA,?,?,00000000,00000000,?,?,?,?,?,?,005D4F20,?), ref: 006135E6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                  • String ID: SCRIPT
                                                                  • API String ID: 3051347437-3967369404
                                                                  • Opcode ID: 998065ab5100cd6b988080ae65b8f6734b4b03592624ed03ca2f06c92038cd5d
                                                                  • Instruction ID: cf69c9c1d30a5f3a7f3755b631b35847fe8ea26174c0ffc0e82e80015da85a54
                                                                  • Opcode Fuzzy Hash: 998065ab5100cd6b988080ae65b8f6734b4b03592624ed03ca2f06c92038cd5d
                                                                  • Instruction Fuzzy Hash: 10117C74200B01BFE7218B69DC48F677BBEEBC5B61F14816AF846D6350DBB1DD009A60

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005D2B6B
                                                                    • Part of subcall function 005D3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006A1418,?,005D2E7F,?,?,?,00000000), ref: 005D3A78
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • GetForegroundWindow.USER32(runas,?,?,?,?,?,00692224), ref: 00612C10
                                                                  • ShellExecuteW.SHELL32(00000000,?,?,00692224), ref: 00612C17
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                  • String ID: runas
                                                                  • API String ID: 448630720-4000483414
                                                                  • Opcode ID: 14a01e789e80ccd2d7f83dff09c7fee61e2ce602cd2c4e2a7acc3bbd6969624e
                                                                  • Instruction ID: cb875cb172d9e19fe290f6770fb4bfba21fe9c8a4362b903275e3cae874b4569
                                                                  • Opcode Fuzzy Hash: 14a01e789e80ccd2d7f83dff09c7fee61e2ce602cd2c4e2a7acc3bbd6969624e
                                                                  • Instruction Fuzzy Hash: 5A11BB312083435AD724FF6CD8599BE7FA6BBE6750F04141FF082562A2CF61494AD713
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharUpper
                                                                  • String ID: p#j
                                                                  • API String ID: 3964851224-3095285349
                                                                  • Opcode ID: 1d137aa2a1f1e1cd85c991818e93914907021974fffdafccef84d4ad8d3e2af4
                                                                  • Instruction ID: 15c520fef14d4c32bad02094485376768aaec2d03d5559e8c2e4fc79d45adf46
                                                                  • Opcode Fuzzy Hash: 1d137aa2a1f1e1cd85c991818e93914907021974fffdafccef84d4ad8d3e2af4
                                                                  • Instruction Fuzzy Hash: D3A258706083529FD724DF18C484B6ABBE1BF89304F14896EE89A9B352D771EC45CF92
                                                                  APIs
                                                                  • GetInputState.USER32 ref: 005DD807
                                                                  • timeGetTime.WINMM ref: 005DDA07
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005DDB28
                                                                  • TranslateMessage.USER32(?), ref: 005DDB7B
                                                                  • DispatchMessageW.USER32(?), ref: 005DDB89
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005DDB9F
                                                                  • Sleep.KERNEL32(0000000A), ref: 005DDBB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                  • String ID:
                                                                  • API String ID: 2189390790-0
                                                                  • Opcode ID: bf6863d9552cb44ba92718a87becee696c7e053bd215416e940d72ad3ca1bfa8
                                                                  • Instruction ID: cb00c8c3d07955d792f0f0418e8f699ba810535bba048e4c0c64d7e2ed234a13
                                                                  • Opcode Fuzzy Hash: bf6863d9552cb44ba92718a87becee696c7e053bd215416e940d72ad3ca1bfa8
                                                                  • Instruction Fuzzy Hash: 9C42C330608642EFD734DF28D854BAABBB2BF46314F14855BE4958B391D771E844CFA2

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 005D3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006A1418,?,005D2E7F,?,?,?,00000000), ref: 005D3A78
                                                                    • Part of subcall function 005D3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 005D3379
                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 005D356A
                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0061318D
                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006131CE
                                                                  • RegCloseKey.ADVAPI32(?), ref: 00613210
                                                                  • _wcslen.LIBCMT ref: 00613277
                                                                  • _wcslen.LIBCMT ref: 00613286
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                  • String ID: H^$Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                  • API String ID: 98802146-290669323
                                                                  • Opcode ID: 2426ba3c5ac3cf26b10945b5c95ed2bfbf12e2ac80bd5a116b501d8ff00e1be9
                                                                  • Instruction ID: 8242ff6da22076c9baa103c76eae84895858cff74ecb8bb2bf988659163b016e
                                                                  • Opcode Fuzzy Hash: 2426ba3c5ac3cf26b10945b5c95ed2bfbf12e2ac80bd5a116b501d8ff00e1be9
                                                                  • Instruction Fuzzy Hash: D471AE714443029EC714EF69DCA58ABBBE9FF86750F40182FF58583260EB74AA48CF52

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 005D2D07
                                                                  • RegisterClassExW.USER32(00000030), ref: 005D2D31
                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005D2D42
                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 005D2D5F
                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005D2D6F
                                                                  • LoadIconW.USER32(000000A9), ref: 005D2D85
                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005D2D94
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                  • API String ID: 2914291525-1005189915
                                                                  • Opcode ID: 121b6a6a6e8762139e365b1bc254bcaefe27fb6114374e8c543223a2f51bdb62
                                                                  • Instruction ID: 6e47a437f9c65f56e95d4876de84832cf65a562f6e3e7fc1d11d957aa11f6066
                                                                  • Opcode Fuzzy Hash: 121b6a6a6e8762139e365b1bc254bcaefe27fb6114374e8c543223a2f51bdb62
                                                                  • Instruction Fuzzy Hash: B521E3B5901318AFDB00EFA4E849BEEBFB6FB0A721F00511AF551AA2A0D7B11544CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 372 61065b-61068b call 61042f 375 6106a6-6106b2 call 605221 372->375 376 61068d-610698 call 5ff2c6 372->376 381 6106b4-6106c9 call 5ff2c6 call 5ff2d9 375->381 382 6106cb-610714 call 61039a 375->382 383 61069a-6106a1 call 5ff2d9 376->383 381->383 392 610781-61078a GetFileType 382->392 393 610716-61071f 382->393 390 61097d-610983 383->390 394 6107d3-6107d6 392->394 395 61078c-6107bd GetLastError call 5ff2a3 CloseHandle 392->395 397 610721-610725 393->397 398 610756-61077c GetLastError call 5ff2a3 393->398 401 6107d8-6107dd 394->401 402 6107df-6107e5 394->402 395->383 409 6107c3-6107ce call 5ff2d9 395->409 397->398 403 610727-610754 call 61039a 397->403 398->383 406 6107e9-610837 call 60516a 401->406 402->406 407 6107e7 402->407 403->392 403->398 414 610847-61086b call 61014d 406->414 415 610839-610845 call 6105ab 406->415 407->406 409->383 422 61086d 414->422 423 61087e-6108c1 414->423 415->414 421 61086f-610879 call 6086ae 415->421 421->390 422->421 425 6108c3-6108c7 423->425 426 6108e2-6108f0 423->426 425->426 428 6108c9-6108dd 425->428 429 6108f6-6108fa 426->429 430 61097b 426->430 428->426 429->430 431 6108fc-61092f CloseHandle call 61039a 429->431 430->390 434 610931-61095d GetLastError call 5ff2a3 call 605333 431->434 435 610963-610977 431->435 434->435 435->430
                                                                  APIs
                                                                    • Part of subcall function 0061039A: CreateFileW.KERNELBASE(00000000,00000000,?,00610704,?,?,00000000,?,00610704,00000000,0000000C), ref: 006103B7
                                                                  • GetLastError.KERNEL32 ref: 0061076F
                                                                  • __dosmaperr.LIBCMT ref: 00610776
                                                                  • GetFileType.KERNELBASE(00000000), ref: 00610782
                                                                  • GetLastError.KERNEL32 ref: 0061078C
                                                                  • __dosmaperr.LIBCMT ref: 00610795
                                                                  • CloseHandle.KERNEL32(00000000), ref: 006107B5
                                                                  • CloseHandle.KERNEL32(?), ref: 006108FF
                                                                  • GetLastError.KERNEL32 ref: 00610931
                                                                  • __dosmaperr.LIBCMT ref: 00610938
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                  • String ID: H
                                                                  • API String ID: 4237864984-2852464175
                                                                  • Opcode ID: d9da52d9082221312aa4cbc5f481e600d4c2da53e870eeacb8586744edd160ee
                                                                  • Instruction ID: 1798ea5f7325338798029abd64ce6ef5554c59f3f50ba091bca0b282bdd8ca53
                                                                  • Opcode Fuzzy Hash: d9da52d9082221312aa4cbc5f481e600d4c2da53e870eeacb8586744edd160ee
                                                                  • Instruction Fuzzy Hash: BDA13632A041098FEF19AF68DC51BEE3BA2AF46320F18015DF815AB3D1D7759C92CB91

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 005D2B8E
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 005D2B9D
                                                                  • LoadIconW.USER32(00000063), ref: 005D2BB3
                                                                  • LoadIconW.USER32(000000A4), ref: 005D2BC5
                                                                  • LoadIconW.USER32(000000A2), ref: 005D2BD7
                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005D2BEF
                                                                  • RegisterClassExW.USER32(?), ref: 005D2C40
                                                                    • Part of subcall function 005D2CD4: GetSysColorBrush.USER32(0000000F), ref: 005D2D07
                                                                    • Part of subcall function 005D2CD4: RegisterClassExW.USER32(00000030), ref: 005D2D31
                                                                    • Part of subcall function 005D2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005D2D42
                                                                    • Part of subcall function 005D2CD4: InitCommonControlsEx.COMCTL32(?), ref: 005D2D5F
                                                                    • Part of subcall function 005D2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005D2D6F
                                                                    • Part of subcall function 005D2CD4: LoadIconW.USER32(000000A9), ref: 005D2D85
                                                                    • Part of subcall function 005D2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005D2D94
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                  • String ID: #$0$AutoIt v3
                                                                  • API String ID: 423443420-4155596026
                                                                  • Opcode ID: 97b48bc258768ce6bf64ebb1c7ab3b65e3596867caa2393bdefd589cde972e3f
                                                                  • Instruction ID: 18c2268aee73dce6d041230a9f13eb41993d55b765fef6ae60d03cf6059125ac
                                                                  • Opcode Fuzzy Hash: 97b48bc258768ce6bf64ebb1c7ab3b65e3596867caa2393bdefd589cde972e3f
                                                                  • Instruction Fuzzy Hash: 47211A74E00314AFDF10AFA5EC55AA97FF6FB4AB60F00101AE504AA6A0D7B12A40CF90
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 005DBB4E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Init_thread_footer
                                                                  • String ID: p#j$p#j$p#j$p#j$p%j$p%j$x#j$x#j
                                                                  • API String ID: 1385522511-2875803811
                                                                  • Opcode ID: e9e7f6f9591437c82ca15ee7d754fdc8980652581a8ada733b74c3f00101ccec
                                                                  • Instruction ID: 5d9483c6c494ca64201694efdcbf550aebc0dbf415e227da3ba7cfa87dcde82c
                                                                  • Opcode Fuzzy Hash: e9e7f6f9591437c82ca15ee7d754fdc8980652581a8ada733b74c3f00101ccec
                                                                  • Instruction Fuzzy Hash: 9A328C34A0021ADFEB24DF58C898ABABBB7FB45300F16805BE945AB352C774AD41CF51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 650 5d3170-5d3185 651 5d31e5-5d31e7 650->651 652 5d3187-5d318a 650->652 651->652 655 5d31e9 651->655 653 5d318c-5d3193 652->653 654 5d31eb 652->654 658 5d3199-5d319e 653->658 659 5d3265-5d326d PostQuitMessage 653->659 656 612dfb-612e23 call 5d18e2 call 5ee499 654->656 657 5d31f1-5d31f6 654->657 660 5d31d0-5d31d8 DefWindowProcW 655->660 696 612e28-612e2f 656->696 661 5d321d-5d3244 SetTimer RegisterWindowMessageW 657->661 662 5d31f8-5d31fb 657->662 664 5d31a4-5d31a8 658->664 665 612e7c-612e90 call 63bf30 658->665 667 5d3219-5d321b 659->667 666 5d31de-5d31e4 660->666 661->667 671 5d3246-5d3251 CreatePopupMenu 661->671 668 5d3201-5d3214 KillTimer call 5d30f2 call 5d3c50 662->668 669 612d9c-612d9f 662->669 672 5d31ae-5d31b3 664->672 673 612e68-612e77 call 63c161 664->673 665->667 689 612e96 665->689 667->666 668->667 681 612da1-612da5 669->681 682 612dd7-612df6 MoveWindow 669->682 671->667 678 5d31b9-5d31be 672->678 679 612e4d-612e54 672->679 673->667 687 5d31c4-5d31ca 678->687 688 5d3253-5d3263 call 5d326f 678->688 679->660 683 612e5a-612e63 call 630ad7 679->683 690 612da7-612daa 681->690 691 612dc6-612dd2 SetFocus 681->691 682->667 683->660 687->660 687->696 688->667 689->660 690->687 692 612db0-612dc1 call 5d18e2 690->692 691->667 692->667 696->660 700 612e35-612e48 call 5d30f2 call 5d3837 696->700 700->660
                                                                  APIs
                                                                  • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,005D316A,?,?), ref: 005D31D8
                                                                  • KillTimer.USER32(?,00000001,?,?,?,?,?,005D316A,?,?), ref: 005D3204
                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005D3227
                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,005D316A,?,?), ref: 005D3232
                                                                  • CreatePopupMenu.USER32 ref: 005D3246
                                                                  • PostQuitMessage.USER32(00000000), ref: 005D3267
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                  • String ID: TaskbarCreated
                                                                  • API String ID: 129472671-2362178303
                                                                  • Opcode ID: 57a8010a2ad34695f8b60f3e4e4021f306fba94585aa764fbac3094ae367bc29
                                                                  • Instruction ID: 8e81bdae0e3874294409674844df09396b25aaa47e9548416c1085355eca7878
                                                                  • Opcode Fuzzy Hash: 57a8010a2ad34695f8b60f3e4e4021f306fba94585aa764fbac3094ae367bc29
                                                                  • Instruction Fuzzy Hash: 3141E639640506AADB342FACDC2D7BA3E1BFB47350F081527F541893A1C6A19E40DBA2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 706 111c5c8-111c676 call 1119fe8 709 111c67d-111c6a3 call 111d4d8 CreateFileW 706->709 712 111c6a5 709->712 713 111c6aa-111c6ba 709->713 714 111c7f5-111c7f9 712->714 721 111c6c1-111c6db VirtualAlloc 713->721 722 111c6bc 713->722 715 111c83b-111c83e 714->715 716 111c7fb-111c7ff 714->716 718 111c841-111c848 715->718 719 111c801-111c804 716->719 720 111c80b-111c80f 716->720 723 111c84a-111c855 718->723 724 111c89d-111c8b2 718->724 719->720 725 111c811-111c81b 720->725 726 111c81f-111c823 720->726 727 111c6e2-111c6f9 ReadFile 721->727 728 111c6dd 721->728 722->714 731 111c857 723->731 732 111c859-111c865 723->732 733 111c8c2-111c8ca 724->733 734 111c8b4-111c8bf VirtualFree 724->734 725->726 735 111c833 726->735 736 111c825-111c82f 726->736 729 111c700-111c740 VirtualAlloc 727->729 730 111c6fb 727->730 728->714 737 111c742 729->737 738 111c747-111c762 call 111d728 729->738 730->714 731->724 739 111c867-111c877 732->739 740 111c879-111c885 732->740 734->733 735->715 736->735 737->714 746 111c76d-111c777 738->746 742 111c89b 739->742 743 111c892-111c898 740->743 744 111c887-111c890 740->744 742->718 743->742 744->742 747 111c779-111c7a8 call 111d728 746->747 748 111c7aa-111c7be call 111d538 746->748 747->746 754 111c7c0 748->754 755 111c7c2-111c7c6 748->755 754->714 756 111c7d2-111c7d6 755->756 757 111c7c8-111c7cc CloseHandle 755->757 758 111c7e6-111c7ef 756->758 759 111c7d8-111c7e3 VirtualFree 756->759 757->756 758->709 758->714 759->758
                                                                  APIs
                                                                  • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0111C699
                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0111C8BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2027509460.0000000001119000.00000040.00000020.00020000.00000000.sdmp, Offset: 01119000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1119000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFileFreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 204039940-0
                                                                  • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                  • Instruction ID: 98d574113a4909a3bf36d7a8cff59ddcba6d890fad1ebe8e4176cf5e84e12731
                                                                  • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                  • Instruction Fuzzy Hash: F6A12A74E40209EBDB18CFA4C898BEEFBB5BF48304F208569E511BB284D7759A41CF95

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 005D1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 005D1BF4
                                                                    • Part of subcall function 005D1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 005D1BFC
                                                                    • Part of subcall function 005D1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 005D1C07
                                                                    • Part of subcall function 005D1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 005D1C12
                                                                    • Part of subcall function 005D1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 005D1C1A
                                                                    • Part of subcall function 005D1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 005D1C22
                                                                    • Part of subcall function 005D1B4A: RegisterWindowMessageW.USER32(00000004,?,005D12C4), ref: 005D1BA2
                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 005D136A
                                                                  • OleInitialize.OLE32 ref: 005D1388
                                                                  • CloseHandle.KERNEL32(00000000,00000000), ref: 006124AB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                  • String ID: q$8$x
                                                                  • API String ID: 1986988660-3110920788
                                                                  • Opcode ID: 504f7cfd5f02dc8ed547413dc4a109c73d84ff23c695dbcfef54e5c4f1a70ccb
                                                                  • Instruction ID: 32fb241025cb9d10d449cc4859886128f1dfbc8b6130a48bc9b26954b913e1fd
                                                                  • Opcode Fuzzy Hash: 504f7cfd5f02dc8ed547413dc4a109c73d84ff23c695dbcfef54e5c4f1a70ccb
                                                                  • Instruction Fuzzy Hash: 29719AF8D116118EC388FF7DA8596653EE3FB8B394F04A22A905ACF361EB3464018F54

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 813 5d2c63-5d2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                  APIs
                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005D2C91
                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005D2CB2
                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,005D1CAD,?), ref: 005D2CC6
                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,005D1CAD,?), ref: 005D2CCF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CreateShow
                                                                  • String ID: AutoIt v3$edit
                                                                  • API String ID: 1584632944-3779509399
                                                                  • Opcode ID: cdb45b013b4631ff6e87ed1e6bf0be5e4780afb3ad880d3113f87b4672cd0cd1
                                                                  • Instruction ID: d41378e94a4aa311c1f6d7ad94e5a6d0a8956e32977f049ccdc68ccf9f44d8d5
                                                                  • Opcode Fuzzy Hash: cdb45b013b4631ff6e87ed1e6bf0be5e4780afb3ad880d3113f87b4672cd0cd1
                                                                  • Instruction Fuzzy Hash: FAF0DA765402A07BEB312B17AC08E772EBFD7C7F60F01205AF900EA5A0C6A52850DEB0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 928 111c398-111c4c4 call 1119fe8 call 111c288 CreateFileW 935 111c4c6 928->935 936 111c4cb-111c4db 928->936 937 111c57b-111c580 935->937 939 111c4e2-111c4fc VirtualAlloc 936->939 940 111c4dd 936->940 941 111c500-111c517 ReadFile 939->941 942 111c4fe 939->942 940->937 943 111c519 941->943 944 111c51b-111c555 call 111c2c8 call 111b288 941->944 942->937 943->937 949 111c571-111c579 ExitProcess 944->949 950 111c557-111c56c call 111c318 944->950 949->937 950->949
                                                                  APIs
                                                                    • Part of subcall function 0111C288: Sleep.KERNELBASE(000001F4), ref: 0111C299
                                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0111C4BA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2027509460.0000000001119000.00000040.00000020.00020000.00000000.sdmp, Offset: 01119000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1119000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFileSleep
                                                                  • String ID: SN40OZ3YVHF9NI
                                                                  • API String ID: 2694422964-2169936353
                                                                  • Opcode ID: 785a7b317e85bd0064ecc28356b9e569c22e1ed0d8389d0bd371a7c53f40b65e
                                                                  • Instruction ID: ba1e898057938779dab0e05bd7e3ef823fb0c0193dc31cd5b31badf9932a1055
                                                                  • Opcode Fuzzy Hash: 785a7b317e85bd0064ecc28356b9e569c22e1ed0d8389d0bd371a7c53f40b65e
                                                                  • Instruction Fuzzy Hash: E3518170D44249EBEF15DBE4C854BEEBB75AF15300F0045A9E608BB2C0D7B91B45CBA6

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1262 5d3b1c-5d3b27 1263 5d3b99-5d3b9b 1262->1263 1264 5d3b29-5d3b2e 1262->1264 1265 5d3b8c-5d3b8f 1263->1265 1264->1263 1266 5d3b30-5d3b48 RegOpenKeyExW 1264->1266 1266->1263 1267 5d3b4a-5d3b69 RegQueryValueExW 1266->1267 1268 5d3b6b-5d3b76 1267->1268 1269 5d3b80-5d3b8b RegCloseKey 1267->1269 1270 5d3b78-5d3b7a 1268->1270 1271 5d3b90-5d3b97 1268->1271 1269->1265 1272 5d3b7e 1270->1272 1271->1272 1272->1269
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,005D3B0F,SwapMouseButtons,00000004,?), ref: 005D3B40
                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,005D3B0F,SwapMouseButtons,00000004,?), ref: 005D3B61
                                                                  • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,005D3B0F,SwapMouseButtons,00000004,?), ref: 005D3B83
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: Control Panel\Mouse
                                                                  • API String ID: 3677997916-824357125
                                                                  • Opcode ID: 7ffc909cf339578d7fba8c564678d06e5fc652883d6ad6d866434e598f4dd5c3
                                                                  • Instruction ID: d1556b42bb5398e3045e85049612467eac6fbfbd4be9dab7ce884f9f24f3ef89
                                                                  • Opcode Fuzzy Hash: 7ffc909cf339578d7fba8c564678d06e5fc652883d6ad6d866434e598f4dd5c3
                                                                  • Instruction Fuzzy Hash: 4D112AB5510208FFEB208FA9DC44AAEBBB8FF04754B10486BE845D7210E2719E409761

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1273 111b288-111b328 call 111d708 * 3 1280 111b32a-111b334 1273->1280 1281 111b33f 1273->1281 1280->1281 1282 111b336-111b33d 1280->1282 1283 111b346-111b34f 1281->1283 1282->1283 1284 111b356-111ba08 1283->1284 1285 111ba1b-111ba48 1284->1285 1286 111ba0a-111ba0e 1284->1286 1302 111ba52 1285->1302 1303 111ba4a-111ba4d 1285->1303 1287 111ba10-111ba14 1286->1287 1288 111ba54-111ba81 1286->1288 1289 111ba16 1287->1289 1290 111ba8d-111baba CreateProcessW 1287->1290 1310 111ba83-111ba86 1288->1310 1311 111ba8b 1288->1311 1292 111bac4-111bade Wow64GetThreadContext 1289->1292 1290->1292 1299 111babc-111babf 1290->1299 1294 111bae0 1292->1294 1295 111bae5-111bb00 ReadProcessMemory 1292->1295 1298 111bdf2-111bdf6 1294->1298 1300 111bb02 1295->1300 1301 111bb07-111bb10 1295->1301 1305 111be47 1298->1305 1306 111bdf8-111bdfc 1298->1306 1299->1292 1307 111be49-111be4b 1299->1307 1300->1298 1308 111bb12-111bb21 1301->1308 1309 111bb39-111bb58 call 111cd88 1301->1309 1302->1292 1303->1307 1305->1307 1312 111be11-111be15 1306->1312 1313 111bdfe-111be0a 1306->1313 1308->1309 1314 111bb23-111bb32 call 111ccd8 1308->1314 1320 111bb5a 1309->1320 1321 111bb5f-111bb82 call 111cec8 1309->1321 1310->1307 1311->1292 1317 111be21-111be25 1312->1317 1318 111be17-111be1a 1312->1318 1313->1312 1314->1309 1329 111bb34 1314->1329 1324 111be31-111be35 1317->1324 1325 111be27-111be2a 1317->1325 1318->1317 1320->1298 1332 111bb84-111bb8b 1321->1332 1333 111bbcc-111bbed call 111cec8 1321->1333 1326 111be42-111be45 1324->1326 1327 111be37-111be3d call 111ccd8 1324->1327 1325->1324 1326->1307 1327->1326 1329->1298 1334 111bbc7 1332->1334 1335 111bb8d-111bbb7 call 111cec8 1332->1335 1340 111bbf4-111bc12 call 111d728 1333->1340 1341 111bbef 1333->1341 1334->1298 1339 111bbbc-111bbbe 1335->1339 1343 111bbc0 1339->1343 1344 111bbc5 1339->1344 1346 111bc1d-111bc27 1340->1346 1341->1298 1343->1298 1344->1333 1347 111bc29-111bc5b call 111d728 1346->1347 1348 111bc5d-111bc61 1346->1348 1347->1346 1350 111bc67-111bc77 1348->1350 1351 111bd4c-111bd69 call 111c8d8 1348->1351 1350->1351 1354 111bc7d-111bc8d 1350->1354 1358 111bd70-111bd8f Wow64SetThreadContext 1351->1358 1359 111bd6b 1351->1359 1354->1351 1357 111bc93-111bcb7 1354->1357 1360 111bcba-111bcbe 1357->1360 1361 111bd91 1358->1361 1362 111bd93-111bd9e call 111cc08 1358->1362 1359->1298 1360->1351 1363 111bcc4-111bcd9 1360->1363 1361->1298 1371 111bda0 1362->1371 1372 111bda2-111bda6 1362->1372 1365 111bced-111bcf1 1363->1365 1366 111bcf3-111bcff 1365->1366 1367 111bd2f-111bd47 1365->1367 1369 111bd01-111bd2b 1366->1369 1370 111bd2d 1366->1370 1367->1360 1369->1370 1370->1365 1371->1298 1374 111bdb2-111bdb6 1372->1374 1375 111bda8-111bdab 1372->1375 1376 111bdc2-111bdc6 1374->1376 1377 111bdb8-111bdbb 1374->1377 1375->1374 1378 111bdd2-111bdd6 1376->1378 1379 111bdc8-111bdcb 1376->1379 1377->1376 1380 111bde3-111bdec 1378->1380 1381 111bdd8-111bdde call 111ccd8 1378->1381 1379->1378 1380->1284 1380->1298 1381->1380
                                                                  APIs
                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 0111BAB5
                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0111BAD9
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0111BAFB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2027509460.0000000001119000.00000040.00000020.00020000.00000000.sdmp, Offset: 01119000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1119000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 2438371351-0
                                                                  • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                                  • Instruction ID: 45f8c8412b62c8c4c3cccd5c80e7aeed09cde72ea61cf78dd055c947033afe3d
                                                                  • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                                  • Instruction Fuzzy Hash: 3E62FD30A14258DBEB28CFA4C850BDEB776FF58304F1091A9D10DEB294E7759E81CB5A
                                                                  APIs
                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006133A2
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 005D3A04
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: IconLoadNotifyShell_String_wcslen
                                                                  • String ID: Line:
                                                                  • API String ID: 2289894680-1585850449
                                                                  • Opcode ID: 0faa3f927dcabc8495e412fec43abdd6f703956b4fbeab3d0e647aa1c7c38cea
                                                                  • Instruction ID: 405c494728e2e71e948c36302ee6df4c00669a1c576d2f101c4e7f57cde8fc4a
                                                                  • Opcode Fuzzy Hash: 0faa3f927dcabc8495e412fec43abdd6f703956b4fbeab3d0e647aa1c7c38cea
                                                                  • Instruction Fuzzy Hash: 5C31E471508315AAC730EF18DC49BEB7BD9BB81710F00192BF59987291EB70AA49CBD3
                                                                  APIs
                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00612C8C
                                                                    • Part of subcall function 005D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005D3A97,?,?,005D2E7F,?,?,?,00000000), ref: 005D3AC2
                                                                    • Part of subcall function 005D2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005D2DC4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Name$Path$FileFullLongOpen
                                                                  • String ID: X$`ei
                                                                  • API String ID: 779396738-2233648704
                                                                  • Opcode ID: 153c8ef50e648fe4d0f87817de6873216a005d84ff3e0afe826df91f39f91041
                                                                  • Instruction ID: b5cd6713bb099c023baa0cf24eebfaa974cc761fe90043afdf41e64bbd8b026e
                                                                  • Opcode Fuzzy Hash: 153c8ef50e648fe4d0f87817de6873216a005d84ff3e0afe826df91f39f91041
                                                                  • Instruction Fuzzy Hash: C321A470A002589BCF51EF98C8097EE7FFDAF89304F00805BE505A7341DBB455898FA1
                                                                  APIs
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 005F0668
                                                                    • Part of subcall function 005F32A4: RaiseException.KERNEL32(?,?,?,005F068A,?,006A1444,?,?,?,?,?,?,005F068A,005D1129,00698738,005D1129), ref: 005F3304
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 005F0685
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                  • String ID: Unknown exception
                                                                  • API String ID: 3476068407-410509341
                                                                  • Opcode ID: 593ad0fd865226da02cffb4a1ccfa9f4366711bcec2b7b801e602d5124f7fda7
                                                                  • Instruction ID: dc7787ec63988373f9cc98afaf1f7e836778af451b09b29b53fc9fac0934e644
                                                                  • Opcode Fuzzy Hash: 593ad0fd865226da02cffb4a1ccfa9f4366711bcec2b7b801e602d5124f7fda7
                                                                  • Instruction Fuzzy Hash: 5BF0C23490020E778F04BAA5EC4ACBE7F6D7E80350B644531BB14DA5D2EF75EA25CA81
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 006582F5
                                                                  • TerminateProcess.KERNEL32(00000000), ref: 006582FC
                                                                  • FreeLibrary.KERNEL32(?,?,?,?), ref: 006584DD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentFreeLibraryTerminate
                                                                  • String ID:
                                                                  • API String ID: 146820519-0
                                                                  • Opcode ID: fa8a868039c4b1de0725e560dd85a9381bf2cf7c882d49a03e5eb455b2af43a8
                                                                  • Instruction ID: fcc475f219f1c1bd0108aa610d06c1106de8bb9ca04bb5b1c8b7d7b7a76f854b
                                                                  • Opcode Fuzzy Hash: fa8a868039c4b1de0725e560dd85a9381bf2cf7c882d49a03e5eb455b2af43a8
                                                                  • Instruction Fuzzy Hash: 4E126C719083419FC724DF28C484B6ABBE6BF85315F04895DE8899B392DB31ED49CB92
                                                                  APIs
                                                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,006085CC,?,00698CC8,0000000C), ref: 00608704
                                                                  • GetLastError.KERNEL32(?,006085CC,?,00698CC8,0000000C), ref: 0060870E
                                                                  • __dosmaperr.LIBCMT ref: 00608739
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 2583163307-0
                                                                  • Opcode ID: a953a7eda6f74ab6b39f91f911ac720a563248c5a674dc52feeea4b74cbaf4c8
                                                                  • Instruction ID: 1aa9d27e98b3de9bd37292d4c2e6f0d9c8fd4a078a6398c2ed37a8f9ed0ef4b1
                                                                  • Opcode Fuzzy Hash: a953a7eda6f74ab6b39f91f911ac720a563248c5a674dc52feeea4b74cbaf4c8
                                                                  • Instruction Fuzzy Hash: 6B018E32A946301EDB6CE334A8457BF2B4B4B92774F3A051DF8459B2D3EFA2CC818654
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 005E17F6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Init_thread_footer
                                                                  • String ID: CALL
                                                                  • API String ID: 1385522511-4196123274
                                                                  • Opcode ID: 2a1432f3acfca780686571154c17c6341f6299a308c515223d19fa9920c76cb0
                                                                  • Instruction ID: bc21ca314b959817c2e56b9fef3ea0b9d88b3bc8b3f8cff5232961d917c2078a
                                                                  • Opcode Fuzzy Hash: 2a1432f3acfca780686571154c17c6341f6299a308c515223d19fa9920c76cb0
                                                                  • Instruction Fuzzy Hash: 0E228B706087829FC718DF15C494A2ABBF2BF89314F14895DF4968B3A2D731E841CF96
                                                                  APIs
                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 005D3908
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: IconNotifyShell_
                                                                  • String ID:
                                                                  • API String ID: 1144537725-0
                                                                  • Opcode ID: 1d315504e2ecaaa40d044e9d47cffaf7aad8a3ce4c550a006d8ad635a3583d0c
                                                                  • Instruction ID: 985aee70c18362b5593e0962be94a52b0b9b595328caf653aa03ff38d7fe53bc
                                                                  • Opcode Fuzzy Hash: 1d315504e2ecaaa40d044e9d47cffaf7aad8a3ce4c550a006d8ad635a3583d0c
                                                                  • Instruction Fuzzy Hash: 7E3193B05057019FD720EF28D884797BBE4FB4A718F00092FF59A97380E7B1AA44DB52
                                                                  APIs
                                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,005D949C,?,00008000), ref: 005D5773
                                                                  • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,005D949C,?,00008000), ref: 00614052
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: ede044c1cbd54f174fde06bbfefed3b1a176dce0e560db436da78a85a4b17ab5
                                                                  • Instruction ID: 7584e0fa4980b1910a418c00077cb9c6118a1af81c498216cdc2aa769e17124f
                                                                  • Opcode Fuzzy Hash: ede044c1cbd54f174fde06bbfefed3b1a176dce0e560db436da78a85a4b17ab5
                                                                  • Instruction Fuzzy Hash: 33014031145625B6E7304A2ADC0EF977F99EF067B1F248212BAAC5A2E0DBB45854CB90
                                                                  APIs
                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 0111BAB5
                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0111BAD9
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0111BAFB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2027509460.0000000001119000.00000040.00000020.00020000.00000000.sdmp, Offset: 01119000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1119000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 2438371351-0
                                                                  • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                  • Instruction ID: a3301b639284803a78158622f3426a30a0f0c2e45bcda4a10d54741808deee49
                                                                  • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                  • Instruction Fuzzy Hash: FE12B024E28658C6EB24DF64D8507DEB232EF68300F1050E9910DEB7A5E77A4F85CF5A
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 544645111-0
                                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                  • Instruction ID: 947fb9c2903d2554480b0ab5b5a73afc4c96a0b58120a64f54d21fada5068f02
                                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                  • Instruction Fuzzy Hash: 04310474A041499BD718CF5AD580969FFA2FF49300B7486A5E889CF651EB31EDC1CBC0
                                                                  APIs
                                                                    • Part of subcall function 005D4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,005D4EDD,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4E9C
                                                                    • Part of subcall function 005D4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005D4EAE
                                                                    • Part of subcall function 005D4E90: FreeLibrary.KERNEL32(00000000,?,?,005D4EDD,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4EC0
                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4EFD
                                                                    • Part of subcall function 005D4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00613CDE,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4E62
                                                                    • Part of subcall function 005D4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005D4E74
                                                                    • Part of subcall function 005D4E59: FreeLibrary.KERNEL32(00000000,?,?,00613CDE,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4E87
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Library$Load$AddressFreeProc
                                                                  • String ID:
                                                                  • API String ID: 2632591731-0
                                                                  • Opcode ID: c2bde09f9c0a5d7140c9bc52c48db941951fff7be9a8b71de43f58f8bee6188d
                                                                  • Instruction ID: 19d7db263839333eeb229c06171a97775e57494547dec6a4f4377c1662798597
                                                                  • Opcode Fuzzy Hash: c2bde09f9c0a5d7140c9bc52c48db941951fff7be9a8b71de43f58f8bee6188d
                                                                  • Instruction Fuzzy Hash: 1B119431610207ABDB34AB68D81ABAD7BA5BF80710F10442FF542A63E1EE749A459B51
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: __wsopen_s
                                                                  • String ID:
                                                                  • API String ID: 3347428461-0
                                                                  • Opcode ID: c09155578f7dfa56d7fad9625e3e360b0eca477f4fa75aee55e5ea8f5bdb493d
                                                                  • Instruction ID: 656de7eb35e5410caee334f0307ce157b6df157dbaaed7a70f5c5f51c8d63dc6
                                                                  • Opcode Fuzzy Hash: c09155578f7dfa56d7fad9625e3e360b0eca477f4fa75aee55e5ea8f5bdb493d
                                                                  • Instruction Fuzzy Hash: 1211067590410AAFCB09DF58E9419DB7BF5EF48314F144099F808AB352DA31EA118BA5
                                                                  APIs
                                                                    • Part of subcall function 00604C7D: RtlAllocateHeap.NTDLL(00000008,005D1129,00000000,?,00602E29,00000001,00000364,?,?,?,005FF2DE,00603863,006A1444,?,005EFDF5,?), ref: 00604CBE
                                                                  • _free.LIBCMT ref: 0060506C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap_free
                                                                  • String ID:
                                                                  • API String ID: 614378929-0
                                                                  • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                  • Instruction ID: a22c3d20efab02afac13fee568ba4a89dce7c500d43d8873112c67219eb3724d
                                                                  • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                  • Instruction Fuzzy Hash: F0014E722447055BE3358F55D84599FFBEEFB85370F25091DE186832C0EA306805CB74
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                  • Instruction ID: db8acdf5fabf5a04d63d32f32ac4a39ce2eed5119d7a5437955293a2927511a0
                                                                  • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                  • Instruction Fuzzy Hash: 18F0F932510A1C9AC6353E65AC0AB7B3B99AF92330F100B19F621D71E2DF78980186A9
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID:
                                                                  • API String ID: 176396367-0
                                                                  • Opcode ID: f6b24c3fb7873ecfde70f49cbf577a0c6885932a9dd24ac64f2ad8a7305e0600
                                                                  • Instruction ID: ccca361451c8673259096c2f265db0537474625f9c3728f4b19ec32d0f62eddd
                                                                  • Opcode Fuzzy Hash: f6b24c3fb7873ecfde70f49cbf577a0c6885932a9dd24ac64f2ad8a7305e0600
                                                                  • Instruction Fuzzy Hash: 05F0C8B36016056ED7249F29DC06AA7BF98FB84760F10852BF619CB2D1DB71E5108BA0
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,005D1129,00000000,?,00602E29,00000001,00000364,?,?,?,005FF2DE,00603863,006A1444,?,005EFDF5,?), ref: 00604CBE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 6a7b0931efb186a7febaad214bba5efb44fa32acf1e3b0a4d1c5afdf556a08f9
                                                                  • Instruction ID: 617a7ca275ac73957a99dff3d5920d621fc773557dd93191cffde9949225c3d6
                                                                  • Opcode Fuzzy Hash: 6a7b0931efb186a7febaad214bba5efb44fa32acf1e3b0a4d1c5afdf556a08f9
                                                                  • Instruction Fuzzy Hash: F7F0B47168222967FB395F629C09BAB3B8ABF817A0F144111FB19AA3C0CE71D80146E0
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,006A1444,?,005EFDF5,?,?,005DA976,00000010,006A1440,005D13FC,?,005D13C6,?,005D1129), ref: 00603852
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: ddd0821339011aced2ff01467d1f160748247d4867104de23ddb7ea312bd46a2
                                                                  • Instruction ID: 11215f2f0da3461671b56e8887a1666e65cb721e5df1eb3c9bed38f9b6a6e99c
                                                                  • Opcode Fuzzy Hash: ddd0821339011aced2ff01467d1f160748247d4867104de23ddb7ea312bd46a2
                                                                  • Instruction Fuzzy Hash: 64E0E53118023956D7252A669C04BEB3B4FAF837B2F0580A0FD06967C0CB11EE0186E1
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(?,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4F6D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID:
                                                                  • API String ID: 3664257935-0
                                                                  • Opcode ID: f1c2d120c2740f7e1db4331e61d9671e6703485d7228b8e9a6a0fae1ef6123fe
                                                                  • Instruction ID: 48263dd34edf05ba385d231c6e79eb695b4eb1e5163b4567b7fb78d2e802c220
                                                                  • Opcode Fuzzy Hash: f1c2d120c2740f7e1db4331e61d9671e6703485d7228b8e9a6a0fae1ef6123fe
                                                                  • Instruction Fuzzy Hash: 16F01571105792CFDB349F68E494822BFE4BF143293208D6FE2EA82721CB319844DF10
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,0061EE51,00693630,00000002), ref: 0063CD26
                                                                    • Part of subcall function 0063CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,0063CD19,?,?,?), ref: 0063CC59
                                                                    • Part of subcall function 0063CC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,0063CD19,?,?,?,?,0061EE51,00693630,00000002), ref: 0063CC6E
                                                                    • Part of subcall function 0063CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,0063CD19,?,?,?,?,0061EE51,00693630,00000002), ref: 0063CC7A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: File$Pointer$Write
                                                                  • String ID:
                                                                  • API String ID: 3847668363-0
                                                                  • Opcode ID: 65106e1cda5f8b507f372a63f0f7795aa076b1a947a0267e5496f8d3d6a94171
                                                                  • Instruction ID: 5bace1cee49809a0666fa6bf2944a949c16c9e13c0b0d08a10bfbdf95ac40337
                                                                  • Opcode Fuzzy Hash: 65106e1cda5f8b507f372a63f0f7795aa076b1a947a0267e5496f8d3d6a94171
                                                                  • Instruction Fuzzy Hash: 02E0397A400604EFC7219F8ADD008AABBF9FF85260710852FF99692510D3B5AA14DBA0
                                                                  APIs
                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005D2DC4
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LongNamePath_wcslen
                                                                  • String ID:
                                                                  • API String ID: 541455249-0
                                                                  • Opcode ID: 0097ed18f5fcd5e0266c1842e1ce6ddd872bd63becee797940c0150c19aa85a6
                                                                  • Instruction ID: a13fe42d67ad340a61d46bbdca8a8325bb38b7ccd026340ea5e2178f09086dc6
                                                                  • Opcode Fuzzy Hash: 0097ed18f5fcd5e0266c1842e1ce6ddd872bd63becee797940c0150c19aa85a6
                                                                  • Instruction Fuzzy Hash: 6FE0CD726041245BC720A2589C05FEA77DDDFC8790F044076FD09D7248D960AD818590
                                                                  APIs
                                                                    • Part of subcall function 005D3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 005D3908
                                                                    • Part of subcall function 005DD730: GetInputState.USER32 ref: 005DD807
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005D2B6B
                                                                    • Part of subcall function 005D30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 005D314E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                  • String ID:
                                                                  • API String ID: 3667716007-0
                                                                  • Opcode ID: a6a509abe0165270b5b97a273e215bc3af865148040093a20621723132364f46
                                                                  • Instruction ID: bcf4d0495b20ef5818f58a4ff2710d013c4cc48e0a38da36660a5d673553c680
                                                                  • Opcode Fuzzy Hash: a6a509abe0165270b5b97a273e215bc3af865148040093a20621723132364f46
                                                                  • Instruction Fuzzy Hash: B9E0262130020606C724BB3CA81A5BDAF9AFBE7351F00143FF04287362CE644A454723
                                                                  APIs
                                                                  • CreateFileW.KERNELBASE(00000000,00000000,?,00610704,?,?,00000000,?,00610704,00000000,0000000C), ref: 006103B7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: e71153d4d028747fc7b47b461783ee3da38fdf25db6b64fa104a4b0db6e8b96e
                                                                  • Instruction ID: f0cb12b7a0ce7ada8c37dfe1dfb2e1a13e97d0723726b2afc167b080658274e3
                                                                  • Opcode Fuzzy Hash: e71153d4d028747fc7b47b461783ee3da38fdf25db6b64fa104a4b0db6e8b96e
                                                                  • Instruction Fuzzy Hash: E7D06C3204010DBBDF028F84DD06EDA3BAAFB48714F014000FE5856020C772E821AB90
                                                                  APIs
                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 005D1CBC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: InfoParametersSystem
                                                                  • String ID:
                                                                  • API String ID: 3098949447-0
                                                                  • Opcode ID: d631d20c3c72c86bd71cb0f2f1dc98c1b1c6c064bca413cb01e26037720b5b5a
                                                                  • Instruction ID: e2681cfdeab473b499b1418a13bc9f2afd693b29750693276b1f4a8788b2605b
                                                                  • Opcode Fuzzy Hash: d631d20c3c72c86bd71cb0f2f1dc98c1b1c6c064bca413cb01e26037720b5b5a
                                                                  • Instruction Fuzzy Hash: C0C09B352C03059FF7145B84BC5AF107756B349B10F045001F649595E3C3E13430DE50
                                                                  APIs
                                                                    • Part of subcall function 005D5745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,005D949C,?,00008000), ref: 005D5773
                                                                  • GetLastError.KERNEL32(00000002,00000000), ref: 006476DE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 1214770103-0
                                                                  • Opcode ID: 7f0f720db45dd3584250f32a72ceca4205df6e0baa5d627e1de6e5cf5921341e
                                                                  • Instruction ID: 800460409f8734a673abe29a2a67594ff08e69d5463fd41e78092e8dc85d3b5a
                                                                  • Opcode Fuzzy Hash: 7f0f720db45dd3584250f32a72ceca4205df6e0baa5d627e1de6e5cf5921341e
                                                                  • Instruction Fuzzy Hash: FE8185306087029FC725EF28C495BA9BBE2BF89314F05455EF8855B392DB30ED45CB92
                                                                  APIs
                                                                  • CloseHandle.KERNELBASE(?,?,00000000,006124E0), ref: 005D6266
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: 52f781026edb76097492976e2e9964c2a84265a8c66f84e614e3e9ce7334e020
                                                                  • Instruction ID: 35144e214b8dfe89fbc4f659abe3f3f7b4f034ef16c176417c17e929a421f3fd
                                                                  • Opcode Fuzzy Hash: 52f781026edb76097492976e2e9964c2a84265a8c66f84e614e3e9ce7334e020
                                                                  • Instruction Fuzzy Hash: 71E0B679400B01CFC3314F1AE804412FBF6FFE13613204A2FD0E592664D3B058868F50
                                                                  APIs
                                                                  • Sleep.KERNELBASE(000001F4), ref: 0111C299
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2027509460.0000000001119000.00000040.00000020.00020000.00000000.sdmp, Offset: 01119000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1119000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                  • Instruction ID: 87c4da745546b8656d716ec810a3414201695fc2cfcb4cbbd7e63f6959155088
                                                                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                  • Instruction Fuzzy Hash: 50E0BF7498010D9FDB00DFA4D54969D7BB4EF04301F100161FD0592280D73099508A62
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0066961A
                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0066965B
                                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0066969F
                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006696C9
                                                                  • SendMessageW.USER32 ref: 006696F2
                                                                  • GetKeyState.USER32(00000011), ref: 0066978B
                                                                  • GetKeyState.USER32(00000009), ref: 00669798
                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006697AE
                                                                  • GetKeyState.USER32(00000010), ref: 006697B8
                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006697E9
                                                                  • SendMessageW.USER32 ref: 00669810
                                                                  • SendMessageW.USER32(?,00001030,?,00667E95), ref: 00669918
                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0066992E
                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00669941
                                                                  • SetCapture.USER32(?), ref: 0066994A
                                                                  • ClientToScreen.USER32(?,?), ref: 006699AF
                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 006699BC
                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006699D6
                                                                  • ReleaseCapture.USER32 ref: 006699E1
                                                                  • GetCursorPos.USER32(?), ref: 00669A19
                                                                  • ScreenToClient.USER32(?,?), ref: 00669A26
                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00669A80
                                                                  • SendMessageW.USER32 ref: 00669AAE
                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00669AEB
                                                                  • SendMessageW.USER32 ref: 00669B1A
                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00669B3B
                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00669B4A
                                                                  • GetCursorPos.USER32(?), ref: 00669B68
                                                                  • ScreenToClient.USER32(?,?), ref: 00669B75
                                                                  • GetParent.USER32(?), ref: 00669B93
                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00669BFA
                                                                  • SendMessageW.USER32 ref: 00669C2B
                                                                  • ClientToScreen.USER32(?,?), ref: 00669C84
                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00669CB4
                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00669CDE
                                                                  • SendMessageW.USER32 ref: 00669D01
                                                                  • ClientToScreen.USER32(?,?), ref: 00669D4E
                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00669D82
                                                                    • Part of subcall function 005E9944: GetWindowLongW.USER32(?,000000EB), ref: 005E9952
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00669E05
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                  • String ID: @GUI_DRAGID$F$h\$p#j
                                                                  • API String ID: 3429851547-1316068924
                                                                  • Opcode ID: 21c621b9f703ccf347057b2e923212d58e6ea39030629c97bf3e3de5af57a636
                                                                  • Instruction ID: 76b4e8e7a6f002470a5f916bf52aef33fcda7fc855f57752bac42c813ef11c91
                                                                  • Opcode Fuzzy Hash: 21c621b9f703ccf347057b2e923212d58e6ea39030629c97bf3e3de5af57a636
                                                                  • Instruction Fuzzy Hash: 9D426E34204741AFEB24DF28CC44AAABBEAFF4A320F140619F995C73A1D771A855CF61
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 006648F3
                                                                  • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00664908
                                                                  • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00664927
                                                                  • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0066494B
                                                                  • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0066495C
                                                                  • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0066497B
                                                                  • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 006649AE
                                                                  • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 006649D4
                                                                  • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00664A0F
                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00664A56
                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00664A7E
                                                                  • IsMenu.USER32(?), ref: 00664A97
                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00664AF2
                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00664B20
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00664B94
                                                                  • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00664BE3
                                                                  • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00664C82
                                                                  • wsprintfW.USER32 ref: 00664CAE
                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00664CC9
                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00664CF1
                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00664D13
                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00664D33
                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00664D5A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                  • String ID: %d/%02d/%02d$h\
                                                                  • API String ID: 4054740463-4057849698
                                                                  • Opcode ID: e0847ce6ab6c306ad9e737b0dae64a982b5488265407dcb8bb5f03df52180bd5
                                                                  • Instruction ID: 8ffb4ab2b65f4e1d8fdb338d676f01b2d88b69a95695aa6d28ca2dff27c112f0
                                                                  • Opcode Fuzzy Hash: e0847ce6ab6c306ad9e737b0dae64a982b5488265407dcb8bb5f03df52180bd5
                                                                  • Instruction Fuzzy Hash: 3B12FD71600245ABEB249F28DC49FBE7BBAEF85710F104129F516EB2E1DBB4A941CB50
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 005EF998
                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0062F474
                                                                  • IsIconic.USER32(00000000), ref: 0062F47D
                                                                  • ShowWindow.USER32(00000000,00000009), ref: 0062F48A
                                                                  • SetForegroundWindow.USER32(00000000), ref: 0062F494
                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0062F4AA
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0062F4B1
                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0062F4BD
                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0062F4CE
                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0062F4D6
                                                                  • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0062F4DE
                                                                  • SetForegroundWindow.USER32(00000000), ref: 0062F4E1
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0062F4F6
                                                                  • keybd_event.USER32(00000012,00000000), ref: 0062F501
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0062F50B
                                                                  • keybd_event.USER32(00000012,00000000), ref: 0062F510
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0062F519
                                                                  • keybd_event.USER32(00000012,00000000), ref: 0062F51E
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0062F528
                                                                  • keybd_event.USER32(00000012,00000000), ref: 0062F52D
                                                                  • SetForegroundWindow.USER32(00000000), ref: 0062F530
                                                                  • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0062F557
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                  • String ID: Shell_TrayWnd
                                                                  • API String ID: 4125248594-2988720461
                                                                  • Opcode ID: ba88ca4ca7f9d305f1c150a532290d59cb5263e47d953f2f708c0541d4e5e12c
                                                                  • Instruction ID: 48cb7cb53aa22b34cf43321034f127526fa64e73b3a7d9c0c6dfbcabb208da45
                                                                  • Opcode Fuzzy Hash: ba88ca4ca7f9d305f1c150a532290d59cb5263e47d953f2f708c0541d4e5e12c
                                                                  • Instruction Fuzzy Hash: 14316371A40668BBEB206BB59C4AFBF7E7EEB44B60F101026F641F61D1C6F15D10AE60
                                                                  APIs
                                                                    • Part of subcall function 006316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0063170D
                                                                    • Part of subcall function 006316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0063173A
                                                                    • Part of subcall function 006316C3: GetLastError.KERNEL32 ref: 0063174A
                                                                  • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00631286
                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 006312A8
                                                                  • CloseHandle.KERNEL32(?), ref: 006312B9
                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006312D1
                                                                  • GetProcessWindowStation.USER32 ref: 006312EA
                                                                  • SetProcessWindowStation.USER32(00000000), ref: 006312F4
                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00631310
                                                                    • Part of subcall function 006310BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006311FC), ref: 006310D4
                                                                    • Part of subcall function 006310BF: CloseHandle.KERNEL32(?,?,006311FC), ref: 006310E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                  • String ID: $default$winsta0$Zi
                                                                  • API String ID: 22674027-3349466720
                                                                  • Opcode ID: 4e00c5708860533686f9502b976a598bdece0d4f24977668be987105a2d05539
                                                                  • Instruction ID: d37f1721c7a2863d25b9a3e7a4811d239b7ef1a575189f81662c8c0d09ca70ac
                                                                  • Opcode Fuzzy Hash: 4e00c5708860533686f9502b976a598bdece0d4f24977668be987105a2d05539
                                                                  • Instruction Fuzzy Hash: E8819A71900309AFDF219FA4DC49BFE7BBAEF05700F144129F911AA2A1CB758A44CBA4
                                                                  APIs
                                                                    • Part of subcall function 006310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00631114
                                                                    • Part of subcall function 006310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 00631120
                                                                    • Part of subcall function 006310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 0063112F
                                                                    • Part of subcall function 006310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 00631136
                                                                    • Part of subcall function 006310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0063114D
                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00630BCC
                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00630C00
                                                                  • GetLengthSid.ADVAPI32(?), ref: 00630C17
                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00630C51
                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00630C6D
                                                                  • GetLengthSid.ADVAPI32(?), ref: 00630C84
                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00630C8C
                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00630C93
                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00630CB4
                                                                  • CopySid.ADVAPI32(00000000), ref: 00630CBB
                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00630CEA
                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00630D0C
                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00630D1E
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00630D45
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630D4C
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00630D55
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630D5C
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00630D65
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630D6C
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00630D78
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630D7F
                                                                    • Part of subcall function 00631193: GetProcessHeap.KERNEL32(00000008,00630BB1,?,00000000,?,00630BB1,?), ref: 006311A1
                                                                    • Part of subcall function 00631193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00630BB1,?), ref: 006311A8
                                                                    • Part of subcall function 00631193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00630BB1,?), ref: 006311B7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                  • String ID:
                                                                  • API String ID: 4175595110-0
                                                                  • Opcode ID: 12c83720e8e00fc83924e3d8111d8d25efcc1bd2163ddcbc84686daa92d2e278
                                                                  • Instruction ID: 3fe3ebe5700566fdbae06e2c2512b7f630f3432c1e2f1fa1433c65f8864b001d
                                                                  • Opcode Fuzzy Hash: 12c83720e8e00fc83924e3d8111d8d25efcc1bd2163ddcbc84686daa92d2e278
                                                                  • Instruction Fuzzy Hash: 9B715B7290020AABEF10DFA4DC44FEEBBBABF09310F144555E955A7291D7B1A909CBA0
                                                                  APIs
                                                                  • OpenClipboard.USER32(0066CC08), ref: 0064EB29
                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0064EB37
                                                                  • GetClipboardData.USER32(0000000D), ref: 0064EB43
                                                                  • CloseClipboard.USER32 ref: 0064EB4F
                                                                  • GlobalLock.KERNEL32(00000000), ref: 0064EB87
                                                                  • CloseClipboard.USER32 ref: 0064EB91
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0064EBBC
                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 0064EBC9
                                                                  • GetClipboardData.USER32(00000001), ref: 0064EBD1
                                                                  • GlobalLock.KERNEL32(00000000), ref: 0064EBE2
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0064EC22
                                                                  • IsClipboardFormatAvailable.USER32(0000000F), ref: 0064EC38
                                                                  • GetClipboardData.USER32(0000000F), ref: 0064EC44
                                                                  • GlobalLock.KERNEL32(00000000), ref: 0064EC55
                                                                  • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0064EC77
                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0064EC94
                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0064ECD2
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0064ECF3
                                                                  • CountClipboardFormats.USER32 ref: 0064ED14
                                                                  • CloseClipboard.USER32 ref: 0064ED59
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                  • String ID:
                                                                  • API String ID: 420908878-0
                                                                  • Opcode ID: 612d7e3d91fe67673ddf86a10d477c8e0087c8cd2d208a93f8a3228d8fe6d557
                                                                  • Instruction ID: 47bee5303fc66d92afb3edd68c3ed9271ee8b72b3d100fd33ca8d25e6e37c2d9
                                                                  • Opcode Fuzzy Hash: 612d7e3d91fe67673ddf86a10d477c8e0087c8cd2d208a93f8a3228d8fe6d557
                                                                  • Instruction Fuzzy Hash: 6561AD342042429FD310EF24D898F7A7BA6FF84714F14551AF896973A1DB72ED06CBA2
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 006469BE
                                                                  • FindClose.KERNEL32(00000000), ref: 00646A12
                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00646A4E
                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00646A75
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00646AB2
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00646ADF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                  • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                  • API String ID: 3830820486-3289030164
                                                                  • Opcode ID: ad4edad8adb3c86b86afac0dc7eaed991559348cb2bdd342b8e7e5f7d861e463
                                                                  • Instruction ID: 0c9f2d783f297dcfc4ed10a529389818868d0b9cad60c54918f3eba5ea83bfe6
                                                                  • Opcode Fuzzy Hash: ad4edad8adb3c86b86afac0dc7eaed991559348cb2bdd342b8e7e5f7d861e463
                                                                  • Instruction Fuzzy Hash: 9BD16F72508341AFC314EBA4C895EABBBECBFC8704F44491EF585C6291EB74DA44CB62
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00649663
                                                                  • GetFileAttributesW.KERNEL32(?), ref: 006496A1
                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 006496BB
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 006496D3
                                                                  • FindClose.KERNEL32(00000000), ref: 006496DE
                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 006496FA
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0064974A
                                                                  • SetCurrentDirectoryW.KERNEL32(00696B7C), ref: 00649768
                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00649772
                                                                  • FindClose.KERNEL32(00000000), ref: 0064977F
                                                                  • FindClose.KERNEL32(00000000), ref: 0064978F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                  • String ID: *.*
                                                                  • API String ID: 1409584000-438819550
                                                                  • Opcode ID: dc8211706c0f2e05ba1743838eaa4f09f44c177b6a9fa423632edcf6bbbaa5de
                                                                  • Instruction ID: dccbf2f0e899cc2ed822244c73b5075354a267c00b0f4b2cd265f9505616490e
                                                                  • Opcode Fuzzy Hash: dc8211706c0f2e05ba1743838eaa4f09f44c177b6a9fa423632edcf6bbbaa5de
                                                                  • Instruction Fuzzy Hash: 2D31D3326806196EDF14EFB4DC18AEF77AEAF49320F104156F955E2290EB74DE40CB64
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 006497BE
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00649819
                                                                  • FindClose.KERNEL32(00000000), ref: 00649824
                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00649840
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00649890
                                                                  • SetCurrentDirectoryW.KERNEL32(00696B7C), ref: 006498AE
                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 006498B8
                                                                  • FindClose.KERNEL32(00000000), ref: 006498C5
                                                                  • FindClose.KERNEL32(00000000), ref: 006498D5
                                                                    • Part of subcall function 0063DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0063DB00
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                  • String ID: *.*
                                                                  • API String ID: 2640511053-438819550
                                                                  • Opcode ID: 22c73ee327c5ee2ad7168a4e2eddc31f9571e0d65127d95204d4677e439c84fe
                                                                  • Instruction ID: b7be0c1296b64d8192ab9bbf70c157fafca593fcc87e30e5fcdbb9db4f77425d
                                                                  • Opcode Fuzzy Hash: 22c73ee327c5ee2ad7168a4e2eddc31f9571e0d65127d95204d4677e439c84fe
                                                                  • Instruction Fuzzy Hash: A831D4315806196EDF10EFB8EC48AEF77AEAF46330F104556F950A2290EB70DA45CB74
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?), ref: 00648257
                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00648267
                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00648273
                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00648310
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00648324
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00648356
                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0064838C
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00648395
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentDirectoryTime$File$Local$System
                                                                  • String ID: *.*
                                                                  • API String ID: 1464919966-438819550
                                                                  • Opcode ID: 38fddf497338e15e997010a79fc11a1026a8431e60239df5e1a46fee31714846
                                                                  • Instruction ID: f55c88f2284332787ba9a84c11da9900f8cda15ffcbbe8bc0255b65302287a36
                                                                  • Opcode Fuzzy Hash: 38fddf497338e15e997010a79fc11a1026a8431e60239df5e1a46fee31714846
                                                                  • Instruction Fuzzy Hash: A56158725043069FCB10EF64C8449AFB7EAFF89310F04891EF98997251EB31EA45CB92
                                                                  APIs
                                                                    • Part of subcall function 005D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005D3A97,?,?,005D2E7F,?,?,?,00000000), ref: 005D3AC2
                                                                    • Part of subcall function 0063E199: GetFileAttributesW.KERNEL32(?,0063CF95), ref: 0063E19A
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0063D122
                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0063D1DD
                                                                  • MoveFileW.KERNEL32(?,?), ref: 0063D1F0
                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0063D20D
                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0063D237
                                                                    • Part of subcall function 0063D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0063D21C,?,?), ref: 0063D2B2
                                                                  • FindClose.KERNEL32(00000000,?,?,?), ref: 0063D253
                                                                  • FindClose.KERNEL32(00000000), ref: 0063D264
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                  • String ID: \*.*
                                                                  • API String ID: 1946585618-1173974218
                                                                  • Opcode ID: e06655a89744492b7e9d24da1d5365c6fc752ad618cf94652e2ea77b608714a9
                                                                  • Instruction ID: 2a561cbd6c815ab87db4251965b4054bc5672936f2c42b456f0e7220d24929b1
                                                                  • Opcode Fuzzy Hash: e06655a89744492b7e9d24da1d5365c6fc752ad618cf94652e2ea77b608714a9
                                                                  • Instruction Fuzzy Hash: 2861803190110E9BCF15EBE4E9569EEBB7ABF95300F244066E40173291EB315F09DBA1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                  • String ID:
                                                                  • API String ID: 1737998785-0
                                                                  • Opcode ID: efd56f7fb2e3db2d71a19d7dd3897c34e225da99b52342f82d85e42cb7284985
                                                                  • Instruction ID: 07f29886a190ce82b9a029f3f036c314497761e1415cc60c82052bd774da4844
                                                                  • Opcode Fuzzy Hash: efd56f7fb2e3db2d71a19d7dd3897c34e225da99b52342f82d85e42cb7284985
                                                                  • Instruction Fuzzy Hash: D741CE35604652AFD720DF15D888B69BBE6FF44328F14C09AE455CB762C776EC42CB90
                                                                  APIs
                                                                    • Part of subcall function 006316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0063170D
                                                                    • Part of subcall function 006316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0063173A
                                                                    • Part of subcall function 006316C3: GetLastError.KERNEL32 ref: 0063174A
                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 0063E932
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                  • String ID: $ $@$SeShutdownPrivilege
                                                                  • API String ID: 2234035333-3163812486
                                                                  • Opcode ID: b907bfe8b454cf97a7faed6e6471bfa248dfa3b607d7e358968d7257253ae526
                                                                  • Instruction ID: d75076d318b3fbd88b8c801e9b9378b735074f14f44e07e014bb5a1d0aeb4ed0
                                                                  • Opcode Fuzzy Hash: b907bfe8b454cf97a7faed6e6471bfa248dfa3b607d7e358968d7257253ae526
                                                                  • Instruction Fuzzy Hash: 8E01F972610211AFEB5426B49C86FFF725E9714761F154426FD03F21D1D6A25C4083F4
                                                                  APIs
                                                                  • socket.WSOCK32(00000002,00000001,00000006), ref: 00651276
                                                                  • WSAGetLastError.WSOCK32 ref: 00651283
                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 006512BA
                                                                  • WSAGetLastError.WSOCK32 ref: 006512C5
                                                                  • closesocket.WSOCK32(00000000), ref: 006512F4
                                                                  • listen.WSOCK32(00000000,00000005), ref: 00651303
                                                                  • WSAGetLastError.WSOCK32 ref: 0065130D
                                                                  • closesocket.WSOCK32(00000000), ref: 0065133C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$closesocket$bindlistensocket
                                                                  • String ID:
                                                                  • API String ID: 540024437-0
                                                                  • Opcode ID: adafe00be47bbda7f7ae499d4a52ecd00af805c64226e467f119ca4523aa52d5
                                                                  • Instruction ID: 2717898f450db9a16b96adfb5d17e82d766ec30a55c5a71f31c4554790dd634b
                                                                  • Opcode Fuzzy Hash: adafe00be47bbda7f7ae499d4a52ecd00af805c64226e467f119ca4523aa52d5
                                                                  • Instruction Fuzzy Hash: 5241A2316001019FD720DF28C498B69BBE6BF86329F18818DD8568F392C771ED86CBE1
                                                                  APIs
                                                                  • _free.LIBCMT ref: 0060B9D4
                                                                  • _free.LIBCMT ref: 0060B9F8
                                                                  • _free.LIBCMT ref: 0060BB7F
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00673700), ref: 0060BB91
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,006A121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0060BC09
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,006A1270,000000FF,?,0000003F,00000000,?), ref: 0060BC36
                                                                  • _free.LIBCMT ref: 0060BD4B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                  • String ID:
                                                                  • API String ID: 314583886-0
                                                                  • Opcode ID: 7e1a9722d2a10782bc8b9de4f3540f9c18fdd406530444e90100353e7755093c
                                                                  • Instruction ID: 543c063723d0ece424cb26de6455420c91a8d63577086ff5e5ff498f3374553e
                                                                  • Opcode Fuzzy Hash: 7e1a9722d2a10782bc8b9de4f3540f9c18fdd406530444e90100353e7755093c
                                                                  • Instruction Fuzzy Hash: B7C13971A842059FDB1CAF688C51BEBBBABEF42310F18A55EE490D73D1DB309E418B54
                                                                  APIs
                                                                    • Part of subcall function 005D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005D3A97,?,?,005D2E7F,?,?,?,00000000), ref: 005D3AC2
                                                                    • Part of subcall function 0063E199: GetFileAttributesW.KERNEL32(?,0063CF95), ref: 0063E19A
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0063D420
                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0063D470
                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0063D481
                                                                  • FindClose.KERNEL32(00000000), ref: 0063D498
                                                                  • FindClose.KERNEL32(00000000), ref: 0063D4A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                  • String ID: \*.*
                                                                  • API String ID: 2649000838-1173974218
                                                                  • Opcode ID: 2200bc6b9193d55ceccb38a59298a32e83e194fe9af5eea48647452e47f478a1
                                                                  • Instruction ID: 327a77b33d7112b9130b8b8b40944b96136f81b1d59305ead39fb2201c10f6c4
                                                                  • Opcode Fuzzy Hash: 2200bc6b9193d55ceccb38a59298a32e83e194fe9af5eea48647452e47f478a1
                                                                  • Instruction Fuzzy Hash: B93152710083459BC315EF64D8558AF7BE9BED1314F44491FF4D193291EB30AA09D7A3
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                  • API String ID: 4168288129-2761157908
                                                                  • Opcode ID: 184f87ea2842a0f540750ba96c2fbdf345601e3b7664349357f94cc3f71cca41
                                                                  • Instruction ID: dd4d93f26be35c409a7a956e2b8f994f18382fd835de9266b633c583fdfce65d
                                                                  • Opcode Fuzzy Hash: 184f87ea2842a0f540750ba96c2fbdf345601e3b7664349357f94cc3f71cca41
                                                                  • Instruction Fuzzy Hash: 66C23A71E446298FDB39CF289D407EAB7B6EB44304F1445EAD44EE7281E779AE818F40
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 006464DC
                                                                  • CoInitialize.OLE32(00000000), ref: 00646639
                                                                  • CoCreateInstance.OLE32(0066FCF8,00000000,00000001,0066FB68,?), ref: 00646650
                                                                  • CoUninitialize.OLE32 ref: 006468D4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                  • String ID: .lnk
                                                                  • API String ID: 886957087-24824748
                                                                  • Opcode ID: 096b57df03295f2328d7216f25c7171eadd2eb22ce6458ba8335b0cfd7e58d48
                                                                  • Instruction ID: c9f8540c17f03ac503a36d68ee2d46cb817ba09ba7b46cc8f2a8c32a85409b77
                                                                  • Opcode Fuzzy Hash: 096b57df03295f2328d7216f25c7171eadd2eb22ce6458ba8335b0cfd7e58d48
                                                                  • Instruction Fuzzy Hash: 62D13A715082029FC314DF28C8859ABBBE9FFD9704F40496EF5958B2A1EB71ED05CB92
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(?,?,00000000), ref: 006522E8
                                                                    • Part of subcall function 0064E4EC: GetWindowRect.USER32(?,?), ref: 0064E504
                                                                  • GetDesktopWindow.USER32 ref: 00652312
                                                                  • GetWindowRect.USER32(00000000), ref: 00652319
                                                                  • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00652355
                                                                  • GetCursorPos.USER32(?), ref: 00652381
                                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 006523DF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                  • String ID:
                                                                  • API String ID: 2387181109-0
                                                                  • Opcode ID: 3da2a8c3d5cce6481f92b5ba6b232c1c3c26cf3e9be5ef0eea858efe30a0c4f4
                                                                  • Instruction ID: a702c37791fdc16a9fd16d9ff2c0f27bfb36fbc001b04158e9d1df689c2a77f5
                                                                  • Opcode Fuzzy Hash: 3da2a8c3d5cce6481f92b5ba6b232c1c3c26cf3e9be5ef0eea858efe30a0c4f4
                                                                  • Instruction Fuzzy Hash: 4831CF72504716ABC720DF54CC45BABBBAAFF85314F00091DF98597291DB75EA08CB92
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00649B78
                                                                  • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00649C8B
                                                                    • Part of subcall function 00643874: GetInputState.USER32 ref: 006438CB
                                                                    • Part of subcall function 00643874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00643966
                                                                  • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00649BA8
                                                                  • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00649C75
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                  • String ID: *.*
                                                                  • API String ID: 1972594611-438819550
                                                                  • Opcode ID: 5fd7e2bdeaeade34caabfbad3f5aee2d2f35dd10d96022c58379b091b53a3a79
                                                                  • Instruction ID: ea2b32c24ad05f8f08545efe4f9f5af9f8b896d11e157c1db5fe49d5410c4ce4
                                                                  • Opcode Fuzzy Hash: 5fd7e2bdeaeade34caabfbad3f5aee2d2f35dd10d96022c58379b091b53a3a79
                                                                  • Instruction Fuzzy Hash: C641817198060A9FCF14DF64C989AEFBBBAFF45310F244156F805A2291EB309E44CF61
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 005E9A4E
                                                                  • GetSysColor.USER32(0000000F), ref: 005E9B23
                                                                  • SetBkColor.GDI32(?,00000000), ref: 005E9B36
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Color$LongProcWindow
                                                                  • String ID:
                                                                  • API String ID: 3131106179-0
                                                                  • Opcode ID: fed453fd958ca4e90b44c1a4bdff3972076b7aaf30e9a57d3be5852134e9b186
                                                                  • Instruction ID: f64f9067f9a3e9f0ce982d03fccfa0910c421cb24ecab851fb2dc03c97c8087a
                                                                  • Opcode Fuzzy Hash: fed453fd958ca4e90b44c1a4bdff3972076b7aaf30e9a57d3be5852134e9b186
                                                                  • Instruction Fuzzy Hash: F8A12BB01089A4BEE72CAA3E9C58DBB2E5FFF83344F140519F482DA691CA259D01D676
                                                                  APIs
                                                                    • Part of subcall function 0065304E: inet_addr.WSOCK32(?), ref: 0065307A
                                                                    • Part of subcall function 0065304E: _wcslen.LIBCMT ref: 0065309B
                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 0065185D
                                                                  • WSAGetLastError.WSOCK32 ref: 00651884
                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 006518DB
                                                                  • WSAGetLastError.WSOCK32 ref: 006518E6
                                                                  • closesocket.WSOCK32(00000000), ref: 00651915
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                  • String ID:
                                                                  • API String ID: 1601658205-0
                                                                  • Opcode ID: b949e7ab7dac1f76446d7a530b82df59d8061833ef1082e7d50919c276c91992
                                                                  • Instruction ID: 21f34ace4f3a658d0e3a636ee958fdd72c4dbd7409415ad90513daf6d591e0fe
                                                                  • Opcode Fuzzy Hash: b949e7ab7dac1f76446d7a530b82df59d8061833ef1082e7d50919c276c91992
                                                                  • Instruction Fuzzy Hash: FF51C575A002119FDB20EF28C88AF6A7BE6AB85718F04845DF9459F3C3D771AD41CBA1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                  • String ID:
                                                                  • API String ID: 292994002-0
                                                                  • Opcode ID: 71be9c14f04c42888e4ad14088656b102e015e9d71d292bdb07fd74a6397b5d2
                                                                  • Instruction ID: b6132443f79adac1692d9714746055467995ced7413c5f87e13fabc4fa95baf2
                                                                  • Opcode Fuzzy Hash: 71be9c14f04c42888e4ad14088656b102e015e9d71d292bdb07fd74a6397b5d2
                                                                  • Instruction Fuzzy Hash: E421D3317406015FD7208F1AC854BAA7BE6FF96324B1C8059E846CF351CBB5EC42CB94
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                  • API String ID: 0-1546025612
                                                                  • Opcode ID: 1efed9ddb98e1abf2765d94ca5c327f1ca9616483012b52709e8c64693c01d31
                                                                  • Instruction ID: 3cc5ca700f83020143112caf83927ab2af2ec70c68af4c3dca0d1679d7edfe30
                                                                  • Opcode Fuzzy Hash: 1efed9ddb98e1abf2765d94ca5c327f1ca9616483012b52709e8c64693c01d31
                                                                  • Instruction Fuzzy Hash: 0AA22975A0061ACBDF34CF58C9407FDBBB2BB54314F2885AAE816A7385DB749D81CB90
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006382AA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen
                                                                  • String ID: ($tbi$|
                                                                  • API String ID: 1659193697-2401483324
                                                                  • Opcode ID: 775c5c35addf7e62531d2af22c7074abfa9d6881055b304cc141393cb9b868c5
                                                                  • Instruction ID: e5778b384e7e027709ef94649779526286ca14f0b1163671bf64a7d50dd4ad00
                                                                  • Opcode Fuzzy Hash: 775c5c35addf7e62531d2af22c7074abfa9d6881055b304cc141393cb9b868c5
                                                                  • Instruction Fuzzy Hash: 4A323574A007059FDB28CF59C481AAAB7F1FF48710B15846EE49ADB3A1EB70E941CB80
                                                                  APIs
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0065A6AC
                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0065A6BA
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0065A79C
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0065A7AB
                                                                    • Part of subcall function 005ECE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00613303,?), ref: 005ECE8A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                  • String ID:
                                                                  • API String ID: 1991900642-0
                                                                  • Opcode ID: e5a62da0ae81ef7efbf795b85179e75affb228586019d9302f0cfcca1c4d1094
                                                                  • Instruction ID: 0257dd6760120d17d827509b0547a8d57a953c2232dbbc19c21c919960f19597
                                                                  • Opcode Fuzzy Hash: e5a62da0ae81ef7efbf795b85179e75affb228586019d9302f0cfcca1c4d1094
                                                                  • Instruction Fuzzy Hash: EF5149715083019FD710EF28C88AA6BBBE9FFC9754F00891EF98597291EB70D904CB92
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0063AAAC
                                                                  • SetKeyboardState.USER32(00000080), ref: 0063AAC8
                                                                  • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0063AB36
                                                                  • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0063AB88
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                  • String ID:
                                                                  • API String ID: 432972143-0
                                                                  • Opcode ID: f2c9d336b03205eee80c990fbfff03f7ee9930bafd57aa9a80233c3bbda2663b
                                                                  • Instruction ID: 6a88208de72fa8cf99593a60e0bfbae3fbe77cd3b97fb5c4e64eee4b62037a7b
                                                                  • Opcode Fuzzy Hash: f2c9d336b03205eee80c990fbfff03f7ee9930bafd57aa9a80233c3bbda2663b
                                                                  • Instruction Fuzzy Hash: BB31FA31A40648AFFB35CBA5CC05BFAB7A7AB44320F04421AF5C2962D1D3758981E7E6
                                                                  APIs
                                                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 0064CE89
                                                                  • GetLastError.KERNEL32(?,00000000), ref: 0064CEEA
                                                                  • SetEvent.KERNEL32(?,?,00000000), ref: 0064CEFE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorEventFileInternetLastRead
                                                                  • String ID:
                                                                  • API String ID: 234945975-0
                                                                  • Opcode ID: c0e622917976033226a016cfbd8f63eee7f28c52005742517f310c0562a6a0be
                                                                  • Instruction ID: cc50354eb3f34d0db98edb15956a35b4b52ad4b951387d12fe3c4c8ebace0e45
                                                                  • Opcode Fuzzy Hash: c0e622917976033226a016cfbd8f63eee7f28c52005742517f310c0562a6a0be
                                                                  • Instruction Fuzzy Hash: BE21BDB15017059BDB60DFA5C948BA67BFEEF40324F10442EE646E2351E774EE099B60
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,00615222), ref: 0063DBCE
                                                                  • GetFileAttributesW.KERNEL32(?), ref: 0063DBDD
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0063DBEE
                                                                  • FindClose.KERNEL32(00000000), ref: 0063DBFA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                  • String ID:
                                                                  • API String ID: 2695905019-0
                                                                  • Opcode ID: d4fec68f29f840d69fe43d771d3d2f4d3f0bf3cbd1e05bf4cb0bdca0bcc483b2
                                                                  • Instruction ID: 7b3aa2fbe15a827ac916c31ff358473973d5170cb4871a479b8ab476f50efd50
                                                                  • Opcode Fuzzy Hash: d4fec68f29f840d69fe43d771d3d2f4d3f0bf3cbd1e05bf4cb0bdca0bcc483b2
                                                                  • Instruction Fuzzy Hash: 34F0A0B082091057C3206B78AC0D8BA776E9F02374F106702F8B6C22E0EBF09A5586D5
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32 ref: 0060271A
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00602724
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00602731
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: b2ef9f1306a3456d01160740bcdf5795580cef949363bffe58dbba6342937c69
                                                                  • Instruction ID: 9e5238334b0a16dbe3597e1698b8dd563a2980394f6a5dc24e94043c5d8aa574
                                                                  • Opcode Fuzzy Hash: b2ef9f1306a3456d01160740bcdf5795580cef949363bffe58dbba6342937c69
                                                                  • Instruction Fuzzy Hash: 1531C27495121DABCB21DF68DC887DDBBB8BF08310F5051EAE90CA62A1E7749F818F44
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001), ref: 006451DA
                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00645238
                                                                  • SetErrorMode.KERNEL32(00000000), ref: 006452A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                  • String ID:
                                                                  • API String ID: 1682464887-0
                                                                  • Opcode ID: 6d775be69e06ed781dfdcf92faa94e5d844293df8083700a12a47bcbdd17dc99
                                                                  • Instruction ID: d40e685cc594e1f2f442e1212d840758fcbccd88e674258a9debc3abf8d0eff7
                                                                  • Opcode Fuzzy Hash: 6d775be69e06ed781dfdcf92faa94e5d844293df8083700a12a47bcbdd17dc99
                                                                  • Instruction Fuzzy Hash: 58318E35A00509DFDB00DF94D888EEEBBB5FF49314F04809AE805AB362DB71E946CB90
                                                                  APIs
                                                                    • Part of subcall function 005EFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 005F0668
                                                                    • Part of subcall function 005EFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 005F0685
                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0063170D
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0063173A
                                                                  • GetLastError.KERNEL32 ref: 0063174A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                  • String ID:
                                                                  • API String ID: 577356006-0
                                                                  • Opcode ID: 0e281429d18cabc7933dbb75509380ba3d4bf1a4750508227cb4737731a5078b
                                                                  • Instruction ID: e8813f01b020372cc7269d62edc1fb9b1b25b71b0f9ec4ad409da34c8ec9a288
                                                                  • Opcode Fuzzy Hash: 0e281429d18cabc7933dbb75509380ba3d4bf1a4750508227cb4737731a5078b
                                                                  • Instruction Fuzzy Hash: 401101B2400305AFD718AF54DC86D6ABBBEFB44724B20852EE09657241EB71BC428B60
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0063D608
                                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0063D645
                                                                  • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0063D650
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                                  • String ID:
                                                                  • API String ID: 33631002-0
                                                                  • Opcode ID: ec594526c1ebd9c2cd55cff72b22cba9afb376c3494828a6ede60a64e923e118
                                                                  • Instruction ID: bfb1058dfbcc41cf67b33e3dc45aef709c82aca9984a76b4cb178ffef800f105
                                                                  • Opcode Fuzzy Hash: ec594526c1ebd9c2cd55cff72b22cba9afb376c3494828a6ede60a64e923e118
                                                                  • Instruction Fuzzy Hash: F9118E71E01228BFDB108F95EC45FAFBBBDEB45B60F108111F914E7290C2B04A058BE1
                                                                  APIs
                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0063168C
                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006316A1
                                                                  • FreeSid.ADVAPI32(?), ref: 006316B1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                  • String ID:
                                                                  • API String ID: 3429775523-0
                                                                  • Opcode ID: 775d9fee2cba085700ca3170a6ae20b78c9fe8a7ec6893055ee83948f864496c
                                                                  • Instruction ID: f78794315706a720195d8221aa50a546c4eb8552dc1969ea664b4f75e8e55ae7
                                                                  • Opcode Fuzzy Hash: 775d9fee2cba085700ca3170a6ae20b78c9fe8a7ec6893055ee83948f864496c
                                                                  • Instruction Fuzzy Hash: 9EF04471950308FBDB00DFE08D89AAEBBBDEB08210F404461E500E2180E371AA448A50
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(006028E9,?,005F4CBE,006028E9,006988B8,0000000C,005F4E15,006028E9,00000002,00000000,?,006028E9), ref: 005F4D09
                                                                  • TerminateProcess.KERNEL32(00000000,?,005F4CBE,006028E9,006988B8,0000000C,005F4E15,006028E9,00000002,00000000,?,006028E9), ref: 005F4D10
                                                                  • ExitProcess.KERNEL32 ref: 005F4D22
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: 363d56d5da46dc876e6b7ab678932a5099975d2efc052091b0e51823ba5ddeea
                                                                  • Instruction ID: 37626a4e1ff3dffb2df72a662841e7a4adbbcb23f4e4c6cee9216540a1ea3689
                                                                  • Opcode Fuzzy Hash: 363d56d5da46dc876e6b7ab678932a5099975d2efc052091b0e51823ba5ddeea
                                                                  • Instruction Fuzzy Hash: 60E0B631000948ABDF11AF55DD09A6A3F6AFB85791B104018FD55DA222DB79DD42CE80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /
                                                                  • API String ID: 0-2043925204
                                                                  • Opcode ID: 7a6fe53b73dc4c998cb735b1f10068260746f040ac6401afc988a4395e2d77b8
                                                                  • Instruction ID: 562609c18b3c9f334ce064558e8c399ff5ce641c84620fbb8f6cbeddc286d5f6
                                                                  • Opcode Fuzzy Hash: 7a6fe53b73dc4c998cb735b1f10068260746f040ac6401afc988a4395e2d77b8
                                                                  • Instruction Fuzzy Hash: 02414972540219AFCB289FB9CC49EFB77BAEB84324F10426DF905D72C0E6709E418B50
                                                                  APIs
                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 0062D28C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: NameUser
                                                                  • String ID: X64
                                                                  • API String ID: 2645101109-893830106
                                                                  • Opcode ID: 2511d5900937850c63cdeafb1195f71bb790dde58d1fde1483e8f6685ab8bcb3
                                                                  • Instruction ID: 31980044207c3fe015b4d41216db1af7986c6df3fb8431253b0685f4b33daa0a
                                                                  • Opcode Fuzzy Hash: 2511d5900937850c63cdeafb1195f71bb790dde58d1fde1483e8f6685ab8bcb3
                                                                  • Instruction Fuzzy Hash: F1D0C9B480112DEACB94CB90EC88DD9B77CBB04305F100551F546A2000D77096499F20
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                  • Instruction ID: c780b381e4f31203c5ebb0e0dc1bb99ec0f4d83a9c73f71577bbc796b9a212e4
                                                                  • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                  • Instruction Fuzzy Hash: E3021B71E0021D9BDF14CFA9C9806ADFFB5FF88314F258169DA19EB280D735AE418B94
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Variable is not of type 'Object'.$p#j
                                                                  • API String ID: 0-4239671147
                                                                  • Opcode ID: 837c66d9de1fc75d5b2ee563088f9855ff6c65e3df9132f520fa53fa5cebfa0b
                                                                  • Instruction ID: 8564d49e6ce35bef352b969c54ba14f26b972aae543ea12bb40dce182962e192
                                                                  • Opcode Fuzzy Hash: 837c66d9de1fc75d5b2ee563088f9855ff6c65e3df9132f520fa53fa5cebfa0b
                                                                  • Instruction Fuzzy Hash: B932797090021ADBDF24DF98D885AEDBFBABF45304F20445BE806AB392D771AE45CB50
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00646918
                                                                  • FindClose.KERNEL32(00000000), ref: 00646961
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileFirst
                                                                  • String ID:
                                                                  • API String ID: 2295610775-0
                                                                  • Opcode ID: 962ef87779eb21485bb727c5b02218adc2e2facf0059de73386044f4fc3ff197
                                                                  • Instruction ID: 61dac7ddda4e1b999abf05914a0262b58cd8a9d077de0551fa500947fd4706a4
                                                                  • Opcode Fuzzy Hash: 962ef87779eb21485bb727c5b02218adc2e2facf0059de73386044f4fc3ff197
                                                                  • Instruction Fuzzy Hash: D11181316046029FC710DF29D488A16BBE5FF85328F14C69AF8698F3A2C770EC05CB91
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00654891,?,?,00000035,?), ref: 006437E4
                                                                  • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00654891,?,?,00000035,?), ref: 006437F4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFormatLastMessage
                                                                  • String ID:
                                                                  • API String ID: 3479602957-0
                                                                  • Opcode ID: 2b5c915bcaac35414d6c25dbfb0d0928394f3e23aceee0df94bfd78f4950c320
                                                                  • Instruction ID: d60953d4577c22f9c23ac8190291c393fcf23648551086621f99351f8795615a
                                                                  • Opcode Fuzzy Hash: 2b5c915bcaac35414d6c25dbfb0d0928394f3e23aceee0df94bfd78f4950c320
                                                                  • Instruction Fuzzy Hash: 79F0E5B06053292AE76017668C4DFEB3BAFEFC5771F000176F509E2391D9A09D44C6B0
                                                                  APIs
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0063B25D
                                                                  • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 0063B270
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: InputSendkeybd_event
                                                                  • String ID:
                                                                  • API String ID: 3536248340-0
                                                                  • Opcode ID: 39af49eae1e40752fb47a75840a69db69b776a6776822b989091de32038b9f8c
                                                                  • Instruction ID: c282564cb5c41baf159757b129a7e2d5d717636d1442ac5b192574ace8a5074d
                                                                  • Opcode Fuzzy Hash: 39af49eae1e40752fb47a75840a69db69b776a6776822b989091de32038b9f8c
                                                                  • Instruction Fuzzy Hash: 3FF01D7180428DAFDB059FA1C806BFE7FB5FF04319F00900AF965A5192C7B986119F94
                                                                  APIs
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006311FC), ref: 006310D4
                                                                  • CloseHandle.KERNEL32(?,?,006311FC), ref: 006310E9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                  • String ID:
                                                                  • API String ID: 81990902-0
                                                                  • Opcode ID: 0eab18fa25dd6354b8bba31d124410a8f6ce0fa18906611c080a36041b07d67d
                                                                  • Instruction ID: 571ba2900bff373453afb540ff48bd0447739c9b1543fccaad606cd75cc46cd0
                                                                  • Opcode Fuzzy Hash: 0eab18fa25dd6354b8bba31d124410a8f6ce0fa18906611c080a36041b07d67d
                                                                  • Instruction Fuzzy Hash: 84E0BF72018B51AEE7292B52FC09E777BAAFB04320F14882DF5E5945B1DFA26C90DB50
                                                                  APIs
                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00606766,?,?,00000008,?,?,0060FEFE,00000000), ref: 00606998
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaise
                                                                  • String ID:
                                                                  • API String ID: 3997070919-0
                                                                  • Opcode ID: 85279312e81c48399f84a229b35ed85cad447e4bd14eb2dfca38af1283d1626e
                                                                  • Instruction ID: 7a5262b508783b022761ab5ef6bd7159f3cb7c6d29f575e92bab4032a7315dde
                                                                  • Opcode Fuzzy Hash: 85279312e81c48399f84a229b35ed85cad447e4bd14eb2dfca38af1283d1626e
                                                                  • Instruction Fuzzy Hash: 11B129316506099FD719CF28C486BA67BE1FF45364F258658F89ACF2E2C335D9A2CB40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: 67749d56aecad032e4f476fc0d7d0d1149f9698a8c01490ad2a8489bf4d8d4b5
                                                                  • Instruction ID: a85382a1917704715c1082ec2614b31fe95973b89fd2606cf8a5472f4a76a7af
                                                                  • Opcode Fuzzy Hash: 67749d56aecad032e4f476fc0d7d0d1149f9698a8c01490ad2a8489bf4d8d4b5
                                                                  • Instruction Fuzzy Hash: 4F125E719006299FDB24CF59D8816EEBBF6FF48710F14819AE849EB255DB309A81CF90
                                                                  APIs
                                                                  • BlockInput.USER32(00000001), ref: 0064EABD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: BlockInput
                                                                  • String ID:
                                                                  • API String ID: 3456056419-0
                                                                  • Opcode ID: fbcc636023143a873db82b1ab47e5c08efc9342caa59f2ab84ad9c20eb1aaf65
                                                                  • Instruction ID: acccbee8eca8d3535111428c6fa9d1781d46c10b9646adabb973bb468408a778
                                                                  • Opcode Fuzzy Hash: fbcc636023143a873db82b1ab47e5c08efc9342caa59f2ab84ad9c20eb1aaf65
                                                                  • Instruction Fuzzy Hash: D9E01A312002069FD710EF59D808E9ABBEABF98760F008417FD49C7361DAB1A8818B90
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,005F03EE), ref: 005F09DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: d6955ec0680f0fd3677ce5c07954ea7b5d67f7f9adb862c973ec09b65056ab42
                                                                  • Instruction ID: 1fab38850890e1b825f29d37527bda69b4ebf1d16e3d390e49ee3c15f5c493e9
                                                                  • Opcode Fuzzy Hash: d6955ec0680f0fd3677ce5c07954ea7b5d67f7f9adb862c973ec09b65056ab42
                                                                  • Instruction Fuzzy Hash:
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0
                                                                  • API String ID: 0-4108050209
                                                                  • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                  • Instruction ID: 54f7bf1038b08fdd843f2552fbf850acbbce60e2de636bffcc7580b29332c827
                                                                  • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                  • Instruction Fuzzy Hash: 9351697160C60E5BDB3849688A5D7BE2FD5BB5E380F180D09DB82D7282C65DDE02D356
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0&j
                                                                  • API String ID: 0-3046324192
                                                                  • Opcode ID: 51d58fb6f4e0881ade1294c11760271812e772bfbf3461a3264e8f16e73e23f0
                                                                  • Instruction ID: b6105c1a70f90f2cffb5c1e1111e5df04daa01b0726f8209555f404634cd9852
                                                                  • Opcode Fuzzy Hash: 51d58fb6f4e0881ade1294c11760271812e772bfbf3461a3264e8f16e73e23f0
                                                                  • Instruction Fuzzy Hash: 8E21EB322615128BD728CF79C82367E73E6B755310F24862EE4A7C37D0DE35A904CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6d8610d82c99d2137bfbb0356a1a031c5647af10c8006e8e9e4938d6939a1e00
                                                                  • Instruction ID: 8cc027099975a87351a6d1be30d45ca88d76d9f005288b39042983cdb9aacea9
                                                                  • Opcode Fuzzy Hash: 6d8610d82c99d2137bfbb0356a1a031c5647af10c8006e8e9e4938d6939a1e00
                                                                  • Instruction Fuzzy Hash: EB321421D69F014DD72B9634DC32336A28AAFB73C5F15D737E81AB5AA5EB29D4C34100
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72a2e80cfbce78458ca15bfd8e9ea36858db00cfbb02041947117ec32c154eec
                                                                  • Instruction ID: e0aa97e4acc5c7f6c9a99b586ea47b7e22e3c49dd4dcc9de57509e4a432cd610
                                                                  • Opcode Fuzzy Hash: 72a2e80cfbce78458ca15bfd8e9ea36858db00cfbb02041947117ec32c154eec
                                                                  • Instruction Fuzzy Hash: E832E531A009A58ACF28CB29E494ABD7FA3FF45320F288566E49D97791D234DD82DF41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5c4ceab115336fa4686ebaffaf8db55043ef8cd4b14d7677c51ac296750eff8b
                                                                  • Instruction ID: 710a80eafa37ee04f2547c7ccffefc40310b0c3a8b874507ab416b1737713ab9
                                                                  • Opcode Fuzzy Hash: 5c4ceab115336fa4686ebaffaf8db55043ef8cd4b14d7677c51ac296750eff8b
                                                                  • Instruction Fuzzy Hash: 3C228070A0060ADFDF14CF68D845AEEFBB6FF88300F14452AE816A7391EB35A951CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 301fe65cbe525a6469d8270765d328f2e396cabbe9b9f5579007167992cca8d2
                                                                  • Instruction ID: 9747e1c9d7bda27390bb6300f40dbb9ca481fd92583b308e034a2245c87a1469
                                                                  • Opcode Fuzzy Hash: 301fe65cbe525a6469d8270765d328f2e396cabbe9b9f5579007167992cca8d2
                                                                  • Instruction Fuzzy Hash: 2702D8B0E00206EBDB14DF54D945AEDBBB6FF44300F148566E8169B391EB31EE51CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                  • Instruction ID: 21cf7690d62cad0de4207c3919d9bab61739a63f4dc0e641bc9c9b3172308d8d
                                                                  • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                  • Instruction Fuzzy Hash: 179188721084A78ADB29463E857403EFFF17A923A131A079DD5F2CB1C5FE18C958D724
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                  • Instruction ID: dca3b08cabe3b01ab3f0cfa2c437268f3f928d391c4447abea178361777c3da2
                                                                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                  • Instruction Fuzzy Hash: 1A9175722098E7CADB2D427A857403EFFE16A923A231A079ED5F2CB1C1FD18C554D764
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 369e6e5906e5ce1d2e51b97e7247195e2406800f48341ec2fa4970a52317a1a2
                                                                  • Instruction ID: 2450e25cd9aa24393c400a21348b6295668fd7f63677cb281ddac81174053747
                                                                  • Opcode Fuzzy Hash: 369e6e5906e5ce1d2e51b97e7247195e2406800f48341ec2fa4970a52317a1a2
                                                                  • Instruction Fuzzy Hash: C3616B31208B0E96EE34592C8D99BBE2F95FF8E700F140D1AEB82DB281E55D9E42C315
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                  • Instruction ID: d9b8ea5837d42aba4a7aa51f8825aa9371c9e360fff8024c84be7b4f98b3baba
                                                                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                  • Instruction Fuzzy Hash: 458197326094E789DB2D423A863403EFFE17A923A131A079DD5F6CB1C1EE28D554E764
                                                                  APIs
                                                                  • DeleteObject.GDI32(00000000), ref: 00652B30
                                                                  • DeleteObject.GDI32(00000000), ref: 00652B43
                                                                  • DestroyWindow.USER32 ref: 00652B52
                                                                  • GetDesktopWindow.USER32 ref: 00652B6D
                                                                  • GetWindowRect.USER32(00000000), ref: 00652B74
                                                                  • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00652CA3
                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00652CB1
                                                                  • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652CF8
                                                                  • GetClientRect.USER32(00000000,?), ref: 00652D04
                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00652D40
                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652D62
                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652D75
                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652D80
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00652D89
                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652D98
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00652DA1
                                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652DA8
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00652DB3
                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652DC5
                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,0066FC38,00000000), ref: 00652DDB
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00652DEB
                                                                  • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00652E11
                                                                  • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00652E30
                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00652E52
                                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0065303F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                  • API String ID: 2211948467-2373415609
                                                                  • Opcode ID: ed0333a1fcfbf10a53bc5d550a2a22369bb2ef59f6ceca794d4489b56e2b3574
                                                                  • Instruction ID: 19246a39b63f456e29b1fe2bd67873f75fa6f8b646b74b189374d2f95170b24f
                                                                  • Opcode Fuzzy Hash: ed0333a1fcfbf10a53bc5d550a2a22369bb2ef59f6ceca794d4489b56e2b3574
                                                                  • Instruction Fuzzy Hash: 42029D71500206EFDB14DF64DC99EAE7BBAFB4A321F008159F915AB2A1D770AD01CF60
                                                                  APIs
                                                                  • SetTextColor.GDI32(?,00000000), ref: 0066712F
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00667160
                                                                  • GetSysColor.USER32(0000000F), ref: 0066716C
                                                                  • SetBkColor.GDI32(?,000000FF), ref: 00667186
                                                                  • SelectObject.GDI32(?,?), ref: 00667195
                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 006671C0
                                                                  • GetSysColor.USER32(00000010), ref: 006671C8
                                                                  • CreateSolidBrush.GDI32(00000000), ref: 006671CF
                                                                  • FrameRect.USER32(?,?,00000000), ref: 006671DE
                                                                  • DeleteObject.GDI32(00000000), ref: 006671E5
                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00667230
                                                                  • FillRect.USER32(?,?,?), ref: 00667262
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00667284
                                                                    • Part of subcall function 006673E8: GetSysColor.USER32(00000012), ref: 00667421
                                                                    • Part of subcall function 006673E8: SetTextColor.GDI32(?,?), ref: 00667425
                                                                    • Part of subcall function 006673E8: GetSysColorBrush.USER32(0000000F), ref: 0066743B
                                                                    • Part of subcall function 006673E8: GetSysColor.USER32(0000000F), ref: 00667446
                                                                    • Part of subcall function 006673E8: GetSysColor.USER32(00000011), ref: 00667463
                                                                    • Part of subcall function 006673E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00667471
                                                                    • Part of subcall function 006673E8: SelectObject.GDI32(?,00000000), ref: 00667482
                                                                    • Part of subcall function 006673E8: SetBkColor.GDI32(?,00000000), ref: 0066748B
                                                                    • Part of subcall function 006673E8: SelectObject.GDI32(?,?), ref: 00667498
                                                                    • Part of subcall function 006673E8: InflateRect.USER32(?,000000FF,000000FF), ref: 006674B7
                                                                    • Part of subcall function 006673E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006674CE
                                                                    • Part of subcall function 006673E8: GetWindowLongW.USER32(00000000,000000F0), ref: 006674DB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                  • String ID:
                                                                  • API String ID: 4124339563-0
                                                                  • Opcode ID: 737fd3ff05413a70b8beb3cab6888d8dc4064b733ea6f2768256a093471e9028
                                                                  • Instruction ID: 3b2ac42d4971d48e2db5825102fb9c4a453a7ec0da7b5afd21e708cb483d2c6c
                                                                  • Opcode Fuzzy Hash: 737fd3ff05413a70b8beb3cab6888d8dc4064b733ea6f2768256a093471e9028
                                                                  • Instruction Fuzzy Hash: 75A1C272008701BFDB009F64DC58E6BBBAAFF89334F101A19F9A2961E1D7B5E944CB51
                                                                  APIs
                                                                  • DestroyWindow.USER32(?,?), ref: 005E8E14
                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00626AC5
                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00626AFE
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00626F43
                                                                    • Part of subcall function 005E8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005E8BE8,?,00000000,?,?,?,?,005E8BBA,00000000,?), ref: 005E8FC5
                                                                  • SendMessageW.USER32(?,00001053), ref: 00626F7F
                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00626F96
                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00626FAC
                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00626FB7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                  • String ID: 0$h\
                                                                  • API String ID: 2760611726-4120402753
                                                                  • Opcode ID: c12ef4ab52265684414a8a38ffbff377acb671159a06eaae6812f7cedb094ac5
                                                                  • Instruction ID: 7932e1ab1a774580d86df8f2ea4f34b08042ad884f7bbc9882ddba64e742d70d
                                                                  • Opcode Fuzzy Hash: c12ef4ab52265684414a8a38ffbff377acb671159a06eaae6812f7cedb094ac5
                                                                  • Instruction Fuzzy Hash: 3A12AC30204A61DFDB25DF24E944BBABBA6FF45310F144469F4898B261CB71AC52DF91
                                                                  APIs
                                                                  • DestroyWindow.USER32(00000000), ref: 0065273E
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0065286A
                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 006528A9
                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 006528B9
                                                                  • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00652900
                                                                  • GetClientRect.USER32(00000000,?), ref: 0065290C
                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00652955
                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00652964
                                                                  • GetStockObject.GDI32(00000011), ref: 00652974
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00652978
                                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00652988
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00652991
                                                                  • DeleteDC.GDI32(00000000), ref: 0065299A
                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006529C6
                                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 006529DD
                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00652A1D
                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00652A31
                                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00652A42
                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00652A77
                                                                  • GetStockObject.GDI32(00000011), ref: 00652A82
                                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00652A8D
                                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00652A97
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                  • API String ID: 2910397461-517079104
                                                                  • Opcode ID: 925ea1314ceed945477fe77754495672b7e963df0e3aba8523a282f1af4bc29c
                                                                  • Instruction ID: 7379603c2eaabdc55deafd130a12601a13382704d287d8e5a9878e1a40d055b6
                                                                  • Opcode Fuzzy Hash: 925ea1314ceed945477fe77754495672b7e963df0e3aba8523a282f1af4bc29c
                                                                  • Instruction Fuzzy Hash: F3B17E71A00616AFEB14DFA8DC49FAE7BAAFB49711F004116F914EB290D7B0ED40CB90
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00644AED
                                                                  • GetDriveTypeW.KERNEL32(?,0066CB68,?,\\.\,0066CC08), ref: 00644BCA
                                                                  • SetErrorMode.KERNEL32(00000000,0066CB68,?,\\.\,0066CC08), ref: 00644D36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$DriveType
                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                  • API String ID: 2907320926-4222207086
                                                                  • Opcode ID: 7be248693140e3c4843e678a900478a8c37e0c25295c9d2bba45616a81dbf092
                                                                  • Instruction ID: 6c3e9118fa9a264a6f828e99b58bbbd90491b5de524557a8603fd4d4636437e0
                                                                  • Opcode Fuzzy Hash: 7be248693140e3c4843e678a900478a8c37e0c25295c9d2bba45616a81dbf092
                                                                  • Instruction Fuzzy Hash: 266190306062069BCF14DF28CAC7AA9BBA7FF45345B284416F806ABB91DE31DD46DB41
                                                                  APIs
                                                                  • GetSysColor.USER32(00000012), ref: 00667421
                                                                  • SetTextColor.GDI32(?,?), ref: 00667425
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0066743B
                                                                  • GetSysColor.USER32(0000000F), ref: 00667446
                                                                  • CreateSolidBrush.GDI32(?), ref: 0066744B
                                                                  • GetSysColor.USER32(00000011), ref: 00667463
                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00667471
                                                                  • SelectObject.GDI32(?,00000000), ref: 00667482
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0066748B
                                                                  • SelectObject.GDI32(?,?), ref: 00667498
                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 006674B7
                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006674CE
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 006674DB
                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0066752A
                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00667554
                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00667572
                                                                  • DrawFocusRect.USER32(?,?), ref: 0066757D
                                                                  • GetSysColor.USER32(00000011), ref: 0066758E
                                                                  • SetTextColor.GDI32(?,00000000), ref: 00667596
                                                                  • DrawTextW.USER32(?,006670F5,000000FF,?,00000000), ref: 006675A8
                                                                  • SelectObject.GDI32(?,?), ref: 006675BF
                                                                  • DeleteObject.GDI32(?), ref: 006675CA
                                                                  • SelectObject.GDI32(?,?), ref: 006675D0
                                                                  • DeleteObject.GDI32(?), ref: 006675D5
                                                                  • SetTextColor.GDI32(?,?), ref: 006675DB
                                                                  • SetBkColor.GDI32(?,?), ref: 006675E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                  • String ID:
                                                                  • API String ID: 1996641542-0
                                                                  • Opcode ID: bbe7e221a3c97300ece5d34dfecadb7202b18f1cb33eeefb5db124f4656f7322
                                                                  • Instruction ID: c6606cfac0a2bd4ebf67ce7b29994c2d7103196c1b69cd778218df4a4da4974a
                                                                  • Opcode Fuzzy Hash: bbe7e221a3c97300ece5d34dfecadb7202b18f1cb33eeefb5db124f4656f7322
                                                                  • Instruction Fuzzy Hash: 06615E72900618AFDF019FA4DC49AEEBFBAEB09320F115115F915AB2A1DBB59940CB90
                                                                  APIs
                                                                  • GetCursorPos.USER32(?), ref: 00661128
                                                                  • GetDesktopWindow.USER32 ref: 0066113D
                                                                  • GetWindowRect.USER32(00000000), ref: 00661144
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00661199
                                                                  • DestroyWindow.USER32(?), ref: 006611B9
                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006611ED
                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0066120B
                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0066121D
                                                                  • SendMessageW.USER32(00000000,00000421,?,?), ref: 00661232
                                                                  • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00661245
                                                                  • IsWindowVisible.USER32(00000000), ref: 006612A1
                                                                  • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 006612BC
                                                                  • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 006612D0
                                                                  • GetWindowRect.USER32(00000000,?), ref: 006612E8
                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 0066130E
                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00661328
                                                                  • CopyRect.USER32(?,?), ref: 0066133F
                                                                  • SendMessageW.USER32(00000000,00000412,00000000), ref: 006613AA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                  • String ID: ($0$tooltips_class32
                                                                  • API String ID: 698492251-4156429822
                                                                  • Opcode ID: 21745402969360441dce20a8038600792233234a193859827132475466800bd3
                                                                  • Instruction ID: 16a0aaac5aeb526c7e51db8e0c3dd49e4c6d828f086ce32e7f2ce024a2178f70
                                                                  • Opcode Fuzzy Hash: 21745402969360441dce20a8038600792233234a193859827132475466800bd3
                                                                  • Instruction Fuzzy Hash: 31B1A071604341AFD710DF64C888BAAFBE6FF85310F04891EF9999B261DB71E844CB91
                                                                  APIs
                                                                  • CharUpperBuffW.USER32(?,?), ref: 006602E5
                                                                  • _wcslen.LIBCMT ref: 0066031F
                                                                  • _wcslen.LIBCMT ref: 00660389
                                                                  • _wcslen.LIBCMT ref: 006603F1
                                                                  • _wcslen.LIBCMT ref: 00660475
                                                                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 006604C5
                                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00660504
                                                                    • Part of subcall function 005EF9F2: _wcslen.LIBCMT ref: 005EF9FD
                                                                    • Part of subcall function 0063223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00632258
                                                                    • Part of subcall function 0063223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0063228A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                  • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                  • API String ID: 1103490817-719923060
                                                                  • Opcode ID: 64a567d810fb12a152459ade44833974baa6edcec4e3f0af9876810123b643a0
                                                                  • Instruction ID: 2b3279599b2f471f1a99e2b2247f1a00a9ed6036b0254a988ebcbdfa755fbd98
                                                                  • Opcode Fuzzy Hash: 64a567d810fb12a152459ade44833974baa6edcec4e3f0af9876810123b643a0
                                                                  • Instruction Fuzzy Hash: 27E16C312182029BDB24DF28C55186BB7E6BFC8314F14496DF896AB7A1DB30ED46CB81
                                                                  APIs
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005E8968
                                                                  • GetSystemMetrics.USER32(00000007), ref: 005E8970
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005E899B
                                                                  • GetSystemMetrics.USER32(00000008), ref: 005E89A3
                                                                  • GetSystemMetrics.USER32(00000004), ref: 005E89C8
                                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005E89E5
                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005E89F5
                                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 005E8A28
                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 005E8A3C
                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 005E8A5A
                                                                  • GetStockObject.GDI32(00000011), ref: 005E8A76
                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 005E8A81
                                                                    • Part of subcall function 005E912D: GetCursorPos.USER32(?), ref: 005E9141
                                                                    • Part of subcall function 005E912D: ScreenToClient.USER32(00000000,?), ref: 005E915E
                                                                    • Part of subcall function 005E912D: GetAsyncKeyState.USER32(00000001), ref: 005E9183
                                                                    • Part of subcall function 005E912D: GetAsyncKeyState.USER32(00000002), ref: 005E919D
                                                                  • SetTimer.USER32(00000000,00000000,00000028,005E90FC), ref: 005E8AA8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                  • String ID: AutoIt v3 GUI
                                                                  • API String ID: 1458621304-248962490
                                                                  • Opcode ID: 446c630790097325616de029699f9436ea4a1eb9fde93e1afe5e1c3e33e05397
                                                                  • Instruction ID: a0793b8aaa6d82eb65497ce799cf457f141100d6d346368cd737d89bfe13c841
                                                                  • Opcode Fuzzy Hash: 446c630790097325616de029699f9436ea4a1eb9fde93e1afe5e1c3e33e05397
                                                                  • Instruction Fuzzy Hash: FBB17D75A0025A9FDB14DFA8DC45BBE3BB6FB49324F104229FA55EB290DB74A840CF50
                                                                  APIs
                                                                    • Part of subcall function 006310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00631114
                                                                    • Part of subcall function 006310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 00631120
                                                                    • Part of subcall function 006310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 0063112F
                                                                    • Part of subcall function 006310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 00631136
                                                                    • Part of subcall function 006310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0063114D
                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00630DF5
                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00630E29
                                                                  • GetLengthSid.ADVAPI32(?), ref: 00630E40
                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00630E7A
                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00630E96
                                                                  • GetLengthSid.ADVAPI32(?), ref: 00630EAD
                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00630EB5
                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00630EBC
                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00630EDD
                                                                  • CopySid.ADVAPI32(00000000), ref: 00630EE4
                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00630F13
                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00630F35
                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00630F47
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00630F6E
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630F75
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00630F7E
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630F85
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00630F8E
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630F95
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00630FA1
                                                                  • HeapFree.KERNEL32(00000000), ref: 00630FA8
                                                                    • Part of subcall function 00631193: GetProcessHeap.KERNEL32(00000008,00630BB1,?,00000000,?,00630BB1,?), ref: 006311A1
                                                                    • Part of subcall function 00631193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00630BB1,?), ref: 006311A8
                                                                    • Part of subcall function 00631193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00630BB1,?), ref: 006311B7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                  • String ID:
                                                                  • API String ID: 4175595110-0
                                                                  • Opcode ID: e1aa93f94f3e05013bef3ff79905ea739781d6076ea9d6438a9d7414f32b6d1b
                                                                  • Instruction ID: e19e2f5a0d79730985f7d5213c26b11cc41a150813ca17d76c0d8595991e20bf
                                                                  • Opcode Fuzzy Hash: e1aa93f94f3e05013bef3ff79905ea739781d6076ea9d6438a9d7414f32b6d1b
                                                                  • Instruction Fuzzy Hash: B7715F7190020AEFEF209FA5DC44FEEBBBABF05710F148119F959E6291D7719909CBA0
                                                                  APIs
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0065C4BD
                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,0066CC08,00000000,?,00000000,?,?), ref: 0065C544
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0065C5A4
                                                                  • _wcslen.LIBCMT ref: 0065C5F4
                                                                  • _wcslen.LIBCMT ref: 0065C66F
                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0065C6B2
                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0065C7C1
                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0065C84D
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0065C881
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0065C88E
                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0065C960
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                  • API String ID: 9721498-966354055
                                                                  • Opcode ID: 3fc90c40edce85f38c5937600ae2fc392f2ce0546db3ff5c71fd73249b5a5e94
                                                                  • Instruction ID: 469e7ccfdb44d6cfd9f4c2b5985c83a020c999d44f47d9f7725c2f0f47b09f3d
                                                                  • Opcode Fuzzy Hash: 3fc90c40edce85f38c5937600ae2fc392f2ce0546db3ff5c71fd73249b5a5e94
                                                                  • Instruction Fuzzy Hash: 15126E356043019FD714DF18C895A6ABBE6FF88725F04885EF8899B3A2DB31ED45CB81
                                                                  APIs
                                                                  • CharUpperBuffW.USER32(?,?), ref: 006609C6
                                                                  • _wcslen.LIBCMT ref: 00660A01
                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00660A54
                                                                  • _wcslen.LIBCMT ref: 00660A8A
                                                                  • _wcslen.LIBCMT ref: 00660B06
                                                                  • _wcslen.LIBCMT ref: 00660B81
                                                                    • Part of subcall function 005EF9F2: _wcslen.LIBCMT ref: 005EF9FD
                                                                    • Part of subcall function 00632BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00632BFA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                  • API String ID: 1103490817-4258414348
                                                                  • Opcode ID: de94c2e8d6b58839b2ad6876732bb34a5eb069232c0bb959219f79bb05443614
                                                                  • Instruction ID: 59ac7c5156c36f96a59c38b65b5dafb84b8b662b8e590bb837fbd47bd5ee8152
                                                                  • Opcode Fuzzy Hash: de94c2e8d6b58839b2ad6876732bb34a5eb069232c0bb959219f79bb05443614
                                                                  • Instruction Fuzzy Hash: 3BE18C352083029FCB14DF29C45096BBBE2BF98354F14896DF8969B362D731ED46CB81
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$BuffCharUpper
                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                  • API String ID: 1256254125-909552448
                                                                  • Opcode ID: 3e7a59185af29e6e9b853350fbfdf65edfe4ea927e555ffbc4425ac0514a8891
                                                                  • Instruction ID: 9affe1e7ace5a602a54e6fcb64bff2c9b483011fe2ea3ef52a9302dbd72f2bb3
                                                                  • Opcode Fuzzy Hash: 3e7a59185af29e6e9b853350fbfdf65edfe4ea927e555ffbc4425ac0514a8891
                                                                  • Instruction Fuzzy Hash: 3071D13261022A8FCF20DE6CCD515FA3B97ABA0775F150529FC669B384EA31CD49C3A0
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 0066835A
                                                                  • _wcslen.LIBCMT ref: 0066836E
                                                                  • _wcslen.LIBCMT ref: 00668391
                                                                  • _wcslen.LIBCMT ref: 006683B4
                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 006683F2
                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00665BF2), ref: 0066844E
                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00668487
                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 006684CA
                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00668501
                                                                  • FreeLibrary.KERNEL32(?), ref: 0066850D
                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0066851D
                                                                  • DestroyIcon.USER32(?,?,?,?,?,00665BF2), ref: 0066852C
                                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00668549
                                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00668555
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                  • String ID: .dll$.exe$.icl
                                                                  • API String ID: 799131459-1154884017
                                                                  • Opcode ID: 2068d1092b3c40837201d71fbd4950a2c96b651d92ab82c8017504ca6f57e6bf
                                                                  • Instruction ID: c2c12b2adcaa39e740bd29d62df9b324ce1ad29637a3f583584ce897fd3d8e16
                                                                  • Opcode Fuzzy Hash: 2068d1092b3c40837201d71fbd4950a2c96b651d92ab82c8017504ca6f57e6bf
                                                                  • Instruction Fuzzy Hash: 8E61D07150060ABEEB14DF74CC45BFE7BA9BB44720F10420AF916D62D0DBB49980CBA0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                  • API String ID: 0-1645009161
                                                                  • Opcode ID: 32da4cf06754376b1880829d2ba1f61ef25acf5083c7d31e698c1d3df47f9a7a
                                                                  • Instruction ID: e2ff2ca647179cd9d448e72b05f7e882aedc3363f01d34744dff93e36c7ae1c4
                                                                  • Opcode Fuzzy Hash: 32da4cf06754376b1880829d2ba1f61ef25acf5083c7d31e698c1d3df47f9a7a
                                                                  • Instruction Fuzzy Hash: 0381E67160060ABBDB21AF64DC46FFA7F69BF99300F044427F905AB292EB70D941C791
                                                                  APIs
                                                                  • LoadIconW.USER32(00000063), ref: 00635A2E
                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00635A40
                                                                  • SetWindowTextW.USER32(?,?), ref: 00635A57
                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00635A6C
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00635A72
                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00635A82
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00635A88
                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00635AA9
                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00635AC3
                                                                  • GetWindowRect.USER32(?,?), ref: 00635ACC
                                                                  • _wcslen.LIBCMT ref: 00635B33
                                                                  • SetWindowTextW.USER32(?,?), ref: 00635B6F
                                                                  • GetDesktopWindow.USER32 ref: 00635B75
                                                                  • GetWindowRect.USER32(00000000), ref: 00635B7C
                                                                  • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00635BD3
                                                                  • GetClientRect.USER32(?,?), ref: 00635BE0
                                                                  • PostMessageW.USER32(?,00000005,00000000,?), ref: 00635C05
                                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00635C2F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                  • String ID:
                                                                  • API String ID: 895679908-0
                                                                  • Opcode ID: 2ccd721349040fcafec020dd846d008ee3024c29d2e15045187e312aa652f89a
                                                                  • Instruction ID: f218066b1884f4ff4eff41508485d360acf17137cdb66762bf788816bfa65e49
                                                                  • Opcode Fuzzy Hash: 2ccd721349040fcafec020dd846d008ee3024c29d2e15045187e312aa652f89a
                                                                  • Instruction Fuzzy Hash: EE717F31900B05AFDB20DFA8CE55AAEBBF6FF48715F104518E583A36A0D775E940CB94
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[i
                                                                  • API String ID: 176396367-3562049154
                                                                  • Opcode ID: 3f8881059236ff925fcaa4621ba5edcc3c278216fd333110cc24d943afd56aac
                                                                  • Instruction ID: c9575093d977e80bced1fda157aa66454e6f78c89b6647b20ea3bb116118c7cf
                                                                  • Opcode Fuzzy Hash: 3f8881059236ff925fcaa4621ba5edcc3c278216fd333110cc24d943afd56aac
                                                                  • Instruction Fuzzy Hash: 33E1D432A00536ABCF289FA8C8556FEBBB6BF44710F54811AE456E7341DB30AF8587D0
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  • DragQueryPoint.SHELL32(?,?), ref: 00669147
                                                                    • Part of subcall function 00667674: ClientToScreen.USER32(?,?), ref: 0066769A
                                                                    • Part of subcall function 00667674: GetWindowRect.USER32(?,?), ref: 00667710
                                                                    • Part of subcall function 00667674: PtInRect.USER32(?,?,00668B89), ref: 00667720
                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 006691B0
                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 006691BB
                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 006691DE
                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00669225
                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0066923E
                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00669255
                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00669277
                                                                  • DragFinish.SHELL32(?), ref: 0066927E
                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00669371
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$h\$p#j
                                                                  • API String ID: 221274066-1261072600
                                                                  • Opcode ID: 999178e00fc27b8a9308b581bd2f61b0984286a1fe643b03c81362b7240a9ccf
                                                                  • Instruction ID: a22a9937046370a74f252b541fbd8b94885601313c46bbe606f95ae5142807eb
                                                                  • Opcode Fuzzy Hash: 999178e00fc27b8a9308b581bd2f61b0984286a1fe643b03c81362b7240a9ccf
                                                                  • Instruction Fuzzy Hash: 37615A71108302AFC711EF54DC89DABBBEAFBC5750F00092EF595922A1DB709A49CB62
                                                                  APIs
                                                                  • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005F00C6
                                                                    • Part of subcall function 005F00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(006A070C,00000FA0,D6DBAB2A,?,?,?,?,006123B3,000000FF), ref: 005F011C
                                                                    • Part of subcall function 005F00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,006123B3,000000FF), ref: 005F0127
                                                                    • Part of subcall function 005F00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,006123B3,000000FF), ref: 005F0138
                                                                    • Part of subcall function 005F00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 005F014E
                                                                    • Part of subcall function 005F00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 005F015C
                                                                    • Part of subcall function 005F00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 005F016A
                                                                    • Part of subcall function 005F00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005F0195
                                                                    • Part of subcall function 005F00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005F01A0
                                                                  • ___scrt_fastfail.LIBCMT ref: 005F00E7
                                                                    • Part of subcall function 005F00A3: __onexit.LIBCMT ref: 005F00A9
                                                                  Strings
                                                                  • kernel32.dll, xrefs: 005F0133
                                                                  • InitializeConditionVariable, xrefs: 005F0148
                                                                  • WakeAllConditionVariable, xrefs: 005F0162
                                                                  • SleepConditionVariableCS, xrefs: 005F0154
                                                                  • api-ms-win-core-synch-l1-2-0.dll, xrefs: 005F0122
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                  • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                  • API String ID: 66158676-1714406822
                                                                  • Opcode ID: e02e0dd9ffb298b7ea5d1fdbac19ecb3fe83234430cb354c74bd191a3ad4673b
                                                                  • Instruction ID: a01f5b3b1d453fe07a4c2251134a1ad61a0c9d8c5485c4496a9bba04818ad400
                                                                  • Opcode Fuzzy Hash: e02e0dd9ffb298b7ea5d1fdbac19ecb3fe83234430cb354c74bd191a3ad4673b
                                                                  • Instruction Fuzzy Hash: C9213E32644B156BE7106BA4AC09F7A7B9AFF46B60F051135F941A32D2DFB4AC00CA50
                                                                  APIs
                                                                  • CharLowerBuffW.USER32(00000000,00000000,0066CC08), ref: 00644527
                                                                  • _wcslen.LIBCMT ref: 0064453B
                                                                  • _wcslen.LIBCMT ref: 00644599
                                                                  • _wcslen.LIBCMT ref: 006445F4
                                                                  • _wcslen.LIBCMT ref: 0064463F
                                                                  • _wcslen.LIBCMT ref: 006446A7
                                                                    • Part of subcall function 005EF9F2: _wcslen.LIBCMT ref: 005EF9FD
                                                                  • GetDriveTypeW.KERNEL32(?,00696BF0,00000061), ref: 00644743
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$BuffCharDriveLowerType
                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                  • API String ID: 2055661098-1000479233
                                                                  • Opcode ID: 24e535159a37762ff910d27547e0bd8b1f6b32473dc619bc0d4da8344c9bbbcd
                                                                  • Instruction ID: 1cce9bbbfaf26e01f7fc5d78032a45a17b2e1fe3be0ef8d27780fe9203cb3e3b
                                                                  • Opcode Fuzzy Hash: 24e535159a37762ff910d27547e0bd8b1f6b32473dc619bc0d4da8344c9bbbcd
                                                                  • Instruction Fuzzy Hash: 9BB1D1716083029FC714DF28C896AAABBE6BFE5760F50491EF496C7391EB30D845CB52
                                                                  APIs
                                                                  • DestroyWindow.USER32(?,?), ref: 00666DEB
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00666E5F
                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00666E81
                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00666E94
                                                                  • DestroyWindow.USER32(?), ref: 00666EB5
                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,005D0000,00000000), ref: 00666EE4
                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00666EFD
                                                                  • GetDesktopWindow.USER32 ref: 00666F16
                                                                  • GetWindowRect.USER32(00000000), ref: 00666F1D
                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00666F35
                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00666F4D
                                                                    • Part of subcall function 005E9944: GetWindowLongW.USER32(?,000000EB), ref: 005E9952
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                  • String ID: 0$h\$tooltips_class32
                                                                  • API String ID: 2429346358-1780202110
                                                                  • Opcode ID: f0b4a353321e18a45f531d631b4abea7b86a92ee76457bca5b9a216356480f63
                                                                  • Instruction ID: f55dadfecf7ab6b8248a6813e579449961f336955573dd88a406190342b5d142
                                                                  • Opcode Fuzzy Hash: f0b4a353321e18a45f531d631b4abea7b86a92ee76457bca5b9a216356480f63
                                                                  • Instruction Fuzzy Hash: 63716674104241AFEB21DF18E848EBBBBEAFB99314F04441EF99987361C771A906CB15
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 0065B198
                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0065B1B0
                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0065B1D4
                                                                  • _wcslen.LIBCMT ref: 0065B200
                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0065B214
                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0065B236
                                                                  • _wcslen.LIBCMT ref: 0065B332
                                                                    • Part of subcall function 006405A7: GetStdHandle.KERNEL32(000000F6), ref: 006405C6
                                                                  • _wcslen.LIBCMT ref: 0065B34B
                                                                  • _wcslen.LIBCMT ref: 0065B366
                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0065B3B6
                                                                  • GetLastError.KERNEL32(00000000), ref: 0065B407
                                                                  • CloseHandle.KERNEL32(?), ref: 0065B439
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0065B44A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0065B45C
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0065B46E
                                                                  • CloseHandle.KERNEL32(?), ref: 0065B4E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 2178637699-0
                                                                  • Opcode ID: 97eeb4c7fb593cce33984355cdfb68062bfb8a3d8d6d7a484e2e9552fe9cc63a
                                                                  • Instruction ID: 7110f9d821f4f2d8f8184391f31db32e9609d9a45d718ac4d567ff757b90e525
                                                                  • Opcode Fuzzy Hash: 97eeb4c7fb593cce33984355cdfb68062bfb8a3d8d6d7a484e2e9552fe9cc63a
                                                                  • Instruction Fuzzy Hash: 0FF17A316043419FC724EF24C895B6ABBE6BF85310F14855EF8859B3A2DB31EC49CB52
                                                                  APIs
                                                                  • GetMenuItemCount.USER32(006A1990), ref: 00612F8D
                                                                  • GetMenuItemCount.USER32(006A1990), ref: 0061303D
                                                                  • GetCursorPos.USER32(?), ref: 00613081
                                                                  • SetForegroundWindow.USER32(00000000), ref: 0061308A
                                                                  • TrackPopupMenuEx.USER32(006A1990,00000000,?,00000000,00000000,00000000), ref: 0061309D
                                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006130A9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                  • String ID: 0
                                                                  • API String ID: 36266755-4108050209
                                                                  • Opcode ID: 63c18e7d9bbbd0a8b49da244ab5158680d4bb251a19d351a86dde7a329db9aaf
                                                                  • Instruction ID: 22a8e486c09689b13878b2f01f82a0f1268340944c158b389b6e856ca9e62e92
                                                                  • Opcode Fuzzy Hash: 63c18e7d9bbbd0a8b49da244ab5158680d4bb251a19d351a86dde7a329db9aaf
                                                                  • Instruction Fuzzy Hash: D8710C70640216BEEB319F28CC59FEABF66FF05324F144217F515662E0C7B1A960C795
                                                                  APIs
                                                                    • Part of subcall function 005E8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005E8BE8,?,00000000,?,?,?,?,005E8BBA,00000000,?), ref: 005E8FC5
                                                                  • DestroyWindow.USER32(?), ref: 005E8C81
                                                                  • KillTimer.USER32(00000000,?,?,?,?,005E8BBA,00000000,?), ref: 005E8D1B
                                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00626973
                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,005E8BBA,00000000,?), ref: 006269A1
                                                                  • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,005E8BBA,00000000,?), ref: 006269B8
                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,005E8BBA,00000000), ref: 006269D4
                                                                  • DeleteObject.GDI32(00000000), ref: 006269E6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                  • String ID: h\
                                                                  • API String ID: 641708696-2592641360
                                                                  • Opcode ID: 1299260aad6e50dd365dd51d28b0e76bb1de7c63465779cc3b430b9a7832392f
                                                                  • Instruction ID: fa8a424010f92bf94625f5763aaeda49e756d286cd33ccc23dbb5f47240d54e5
                                                                  • Opcode Fuzzy Hash: 1299260aad6e50dd365dd51d28b0e76bb1de7c63465779cc3b430b9a7832392f
                                                                  • Instruction Fuzzy Hash: 96619130502A51DFCB299F15D948B767BF2FB42311F145919E0CA9E660CB71BC80DF90
                                                                  APIs
                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0064C4B0
                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0064C4C3
                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0064C4D7
                                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0064C4F0
                                                                  • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0064C533
                                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0064C549
                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0064C554
                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0064C584
                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0064C5DC
                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0064C5F0
                                                                  • InternetCloseHandle.WININET(00000000), ref: 0064C5FB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                  • String ID:
                                                                  • API String ID: 3800310941-3916222277
                                                                  • Opcode ID: 47d75a1b9d88836c88431affd5ed31ff0cbd4d52412c4807ef33d2d86d8865d2
                                                                  • Instruction ID: 14fe998abc292f6296f30d2a20ba095a65fd2b0fcee1be4f10e5ddf96c7b9469
                                                                  • Opcode Fuzzy Hash: 47d75a1b9d88836c88431affd5ed31ff0cbd4d52412c4807ef33d2d86d8865d2
                                                                  • Instruction Fuzzy Hash: 02516EB0501608BFDB619F64C948ABB7BFEFF08764F008419F98596310DB74E954DB60
                                                                  APIs
                                                                    • Part of subcall function 005E9944: GetWindowLongW.USER32(?,000000EB), ref: 005E9952
                                                                  • GetSysColor.USER32(0000000F), ref: 005E9862
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ColorLongWindow
                                                                  • String ID: h\
                                                                  • API String ID: 259745315-2592641360
                                                                  • Opcode ID: ed5bee598cb7093d468bf59b62fdb5e58ebda4977f9204fb0f01d918bc6323c4
                                                                  • Instruction ID: 5f0eccb55afdd49c73ea71b3b2e18f3dc1a3c6eec349a0074481036037e357bc
                                                                  • Opcode Fuzzy Hash: ed5bee598cb7093d468bf59b62fdb5e58ebda4977f9204fb0f01d918bc6323c4
                                                                  • Instruction Fuzzy Hash: 6641D031108A90AFDB245F399C88BB97BA6BB17330F145615F9E28B2F2C7709C42DB51
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00668592
                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006685A2
                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006685AD
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006685BA
                                                                  • GlobalLock.KERNEL32(00000000), ref: 006685C8
                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006685D7
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 006685E0
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006685E7
                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006685F8
                                                                  • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0066FC38,?), ref: 00668611
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00668621
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00668641
                                                                  • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00668671
                                                                  • DeleteObject.GDI32(?), ref: 00668699
                                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 006686AF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                  • String ID:
                                                                  • API String ID: 3840717409-0
                                                                  • Opcode ID: 84ace92714139ebbb2d2668daad19d16867ea6c526a8162ac60c9c438deefe0d
                                                                  • Instruction ID: 97f7c04cb81f6411bc78b12de212852d7ba3e1668879a4c28493aeb7c1e56ff9
                                                                  • Opcode Fuzzy Hash: 84ace92714139ebbb2d2668daad19d16867ea6c526a8162ac60c9c438deefe0d
                                                                  • Instruction Fuzzy Hash: A3411975600604BFDB119FA5DC48EAA7BBEEF89B21F104159F946E7260DB709E01CB60
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(00000000), ref: 00641502
                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0064150B
                                                                  • VariantClear.OLEAUT32(?), ref: 00641517
                                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 006415FB
                                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00641657
                                                                  • VariantInit.OLEAUT32(?), ref: 00641708
                                                                  • SysFreeString.OLEAUT32(?), ref: 0064178C
                                                                  • VariantClear.OLEAUT32(?), ref: 006417D8
                                                                  • VariantClear.OLEAUT32(?), ref: 006417E7
                                                                  • VariantInit.OLEAUT32(00000000), ref: 00641823
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                  • API String ID: 1234038744-3931177956
                                                                  • Opcode ID: 89287bb196e10d0cac263762af880d4e50078a63512b35f26b39b682b98d8e81
                                                                  • Instruction ID: 8ca4107cefe6b017d48ee7f1cc2250ec657f0f61f0b064d7aa9e9d267ef85d8b
                                                                  • Opcode Fuzzy Hash: 89287bb196e10d0cac263762af880d4e50078a63512b35f26b39b682b98d8e81
                                                                  • Instruction Fuzzy Hash: 21D1E5B1600516DBDB18EF65D889BBDBBB6BF86700F148056F446AF680DB30EC82DB51
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                    • Part of subcall function 0065C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0065B6AE,?,?), ref: 0065C9B5
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065C9F1
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065CA68
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065CA9E
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0065B6F4
                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0065B772
                                                                  • RegDeleteValueW.ADVAPI32(?,?), ref: 0065B80A
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0065B87E
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0065B89C
                                                                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0065B8F2
                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0065B904
                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0065B922
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 0065B983
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0065B994
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                  • API String ID: 146587525-4033151799
                                                                  • Opcode ID: fc4988b3c814313721b8c32aade11732f1b74f48fe219ac05c8f1a32b9b1df8e
                                                                  • Instruction ID: 87462284557be69eb017b1d384b24d551cafcf3acc45d898fbb8772dea2200e2
                                                                  • Opcode Fuzzy Hash: fc4988b3c814313721b8c32aade11732f1b74f48fe219ac05c8f1a32b9b1df8e
                                                                  • Instruction Fuzzy Hash: 9EC16E30204202AFD720DF18C495F6ABBE6BF85319F14955DF8968B3A2C771ED49CB91
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00668D5A
                                                                  • GetFocus.USER32 ref: 00668D6A
                                                                  • GetDlgCtrlID.USER32(00000000), ref: 00668D75
                                                                  • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00668E1D
                                                                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00668ECF
                                                                  • GetMenuItemCount.USER32(?), ref: 00668EEC
                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00668EFC
                                                                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00668F2E
                                                                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00668F70
                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00668FA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                  • String ID: 0$h\
                                                                  • API String ID: 1026556194-4120402753
                                                                  • Opcode ID: 571dab7f09f07291662d805c84a24d963799bcd099213efdce9f151c96132945
                                                                  • Instruction ID: 54c6cd0170db8b251b28477b438c278d34397e09507125ff083d3c8a4a04b9bd
                                                                  • Opcode Fuzzy Hash: 571dab7f09f07291662d805c84a24d963799bcd099213efdce9f151c96132945
                                                                  • Instruction Fuzzy Hash: 94819F71508341AFDB10DF24D884AAB7BEBFF89354F140A1EF98597291DB71E901CBA2
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00665504
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00665515
                                                                  • CharNextW.USER32(00000158), ref: 00665544
                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00665585
                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0066559B
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006655AC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CharNext
                                                                  • String ID: h\
                                                                  • API String ID: 1350042424-2592641360
                                                                  • Opcode ID: 1688b3c95332405e2ecc8b66d3efe8495175d15ace4014b205ed329e4f86addf
                                                                  • Instruction ID: e20b3f57d98ed2998ffe611bc43772205214bcb5c600b6ad5f5a729ec3a2ca8a
                                                                  • Opcode Fuzzy Hash: 1688b3c95332405e2ecc8b66d3efe8495175d15ace4014b205ed329e4f86addf
                                                                  • Instruction Fuzzy Hash: CC618030900609EFDF109F64CC869FE7BBBEF06724F104149F966AB290DB749A81DB61
                                                                  APIs
                                                                  • GetDC.USER32(00000000), ref: 006525D8
                                                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 006525E8
                                                                  • CreateCompatibleDC.GDI32(?), ref: 006525F4
                                                                  • SelectObject.GDI32(00000000,?), ref: 00652601
                                                                  • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0065266D
                                                                  • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 006526AC
                                                                  • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 006526D0
                                                                  • SelectObject.GDI32(?,?), ref: 006526D8
                                                                  • DeleteObject.GDI32(?), ref: 006526E1
                                                                  • DeleteDC.GDI32(?), ref: 006526E8
                                                                  • ReleaseDC.USER32(00000000,?), ref: 006526F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                  • String ID: (
                                                                  • API String ID: 2598888154-3887548279
                                                                  • Opcode ID: 13953455c55f718decc5d89db4578b3d3776e8f4f81f70d6dd9c1caf42b49846
                                                                  • Instruction ID: 9662a6b8ba72b60abccc21088b2b0d60fc0ef2e980b1c1a8010d752165eca047
                                                                  • Opcode Fuzzy Hash: 13953455c55f718decc5d89db4578b3d3776e8f4f81f70d6dd9c1caf42b49846
                                                                  • Instruction Fuzzy Hash: 2B61F475D0061AEFCF04CFA4D894AAEBBF6FF48310F208529E955A7250D771A941CF94
                                                                  APIs
                                                                  • ___free_lconv_mon.LIBCMT ref: 0060DAA1
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D659
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D66B
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D67D
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D68F
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D6A1
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D6B3
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D6C5
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D6D7
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D6E9
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D6FB
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D70D
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D71F
                                                                    • Part of subcall function 0060D63C: _free.LIBCMT ref: 0060D731
                                                                  • _free.LIBCMT ref: 0060DA96
                                                                    • Part of subcall function 006029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000), ref: 006029DE
                                                                    • Part of subcall function 006029C8: GetLastError.KERNEL32(00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000,00000000), ref: 006029F0
                                                                  • _free.LIBCMT ref: 0060DAB8
                                                                  • _free.LIBCMT ref: 0060DACD
                                                                  • _free.LIBCMT ref: 0060DAD8
                                                                  • _free.LIBCMT ref: 0060DAFA
                                                                  • _free.LIBCMT ref: 0060DB0D
                                                                  • _free.LIBCMT ref: 0060DB1B
                                                                  • _free.LIBCMT ref: 0060DB26
                                                                  • _free.LIBCMT ref: 0060DB5E
                                                                  • _free.LIBCMT ref: 0060DB65
                                                                  • _free.LIBCMT ref: 0060DB82
                                                                  • _free.LIBCMT ref: 0060DB9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                  • String ID:
                                                                  • API String ID: 161543041-0
                                                                  • Opcode ID: aaa64df1ad360d0d096e88a3f1a4fbe14835bb136f56c49d9f1fbf95a121caad
                                                                  • Instruction ID: 5e9f70f856a4960c56b77a1b02231d038bc5addbc136e087ce959cd0b5137088
                                                                  • Opcode Fuzzy Hash: aaa64df1ad360d0d096e88a3f1a4fbe14835bb136f56c49d9f1fbf95a121caad
                                                                  • Instruction Fuzzy Hash: BD317C716842069FEB69AAB9E845B9B77EAFF00710F204A1DE449D72D1DB30EC40C724
                                                                  APIs
                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0063369C
                                                                  • _wcslen.LIBCMT ref: 006336A7
                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00633797
                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 0063380C
                                                                  • GetDlgCtrlID.USER32(?), ref: 0063385D
                                                                  • GetWindowRect.USER32(?,?), ref: 00633882
                                                                  • GetParent.USER32(?), ref: 006338A0
                                                                  • ScreenToClient.USER32(00000000), ref: 006338A7
                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00633921
                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 0063395D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                  • String ID: %s%u
                                                                  • API String ID: 4010501982-679674701
                                                                  • Opcode ID: 4f85f8885b8879fb2e405f42340d2fd44abe8764f5cac491bb0a92a29be9b61e
                                                                  • Instruction ID: 01103dd22312446eaf7fade9c150c69ad77354cdeaec62f9831198b677e06732
                                                                  • Opcode Fuzzy Hash: 4f85f8885b8879fb2e405f42340d2fd44abe8764f5cac491bb0a92a29be9b61e
                                                                  • Instruction Fuzzy Hash: D6919171204616EFD719DF24C885BEAF7AAFF44350F004629FA99C6290EB70EA45CBD1
                                                                  APIs
                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00634994
                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 006349DA
                                                                  • _wcslen.LIBCMT ref: 006349EB
                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 006349F7
                                                                  • _wcsstr.LIBVCRUNTIME ref: 00634A2C
                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00634A64
                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00634A9D
                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00634AE6
                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00634B20
                                                                  • GetWindowRect.USER32(?,?), ref: 00634B8B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                  • String ID: ThumbnailClass
                                                                  • API String ID: 1311036022-1241985126
                                                                  • Opcode ID: 5f5825abf14c58e60fe7972c2c5aa9306ea81b2b3a347134f3f3697e8a7fa6d2
                                                                  • Instruction ID: 19d455fee6c709d602f0f80563e8ec6a33eb4765cd08333aed2ec04029af0cb8
                                                                  • Opcode Fuzzy Hash: 5f5825abf14c58e60fe7972c2c5aa9306ea81b2b3a347134f3f3697e8a7fa6d2
                                                                  • Instruction Fuzzy Hash: 8491AE711042069BDB04CF14C985BAAFBEAFF84314F04846AFD869A296DF34ED45CBA1
                                                                  APIs
                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00663A9D
                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00663AA0
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00663AC7
                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00663AEA
                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00663B62
                                                                  • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00663BAC
                                                                  • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00663BC7
                                                                  • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00663BE2
                                                                  • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00663BF6
                                                                  • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00663C13
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$LongWindow
                                                                  • String ID: h\
                                                                  • API String ID: 312131281-2592641360
                                                                  • Opcode ID: e1719e023fbbeeb3ccc7b95db46f563078797e4e1c2049ca8d2dcdd5d4e538ba
                                                                  • Instruction ID: a532e3605bb6e83a3d939f16d3fbcb3b5c3bf4c5b7bd93d4ad5cd77964b9b679
                                                                  • Opcode Fuzzy Hash: e1719e023fbbeeb3ccc7b95db46f563078797e4e1c2049ca8d2dcdd5d4e538ba
                                                                  • Instruction Fuzzy Hash: 99617975900218AFDB10DFA8CC81EEE77B9EB4A700F10019AFA15AB3A1C774AE41DF50
                                                                  APIs
                                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0063DC20
                                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0063DC46
                                                                  • _wcslen.LIBCMT ref: 0063DC50
                                                                  • _wcsstr.LIBVCRUNTIME ref: 0063DCA0
                                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0063DCBC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                  • API String ID: 1939486746-1459072770
                                                                  • Opcode ID: 73537015d9be9a838e847bc3ca1e02ceb14f783ebd4ca07c80e2515f32efd01a
                                                                  • Instruction ID: 064142613ef7e04d342205c53b66bedc5510440d8022095e48f8cfd6b556bfb3
                                                                  • Opcode Fuzzy Hash: 73537015d9be9a838e847bc3ca1e02ceb14f783ebd4ca07c80e2515f32efd01a
                                                                  • Instruction Fuzzy Hash: 8A4118329407067ADB14AB75DC4BEFF7B6DFF82760F10006AFA00A6182EB75990197B4
                                                                  APIs
                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0065CC64
                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0065CC8D
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0065CD48
                                                                    • Part of subcall function 0065CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0065CCAA
                                                                    • Part of subcall function 0065CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0065CCBD
                                                                    • Part of subcall function 0065CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0065CCCF
                                                                    • Part of subcall function 0065CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0065CD05
                                                                    • Part of subcall function 0065CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0065CD28
                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0065CCF3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                  • API String ID: 2734957052-4033151799
                                                                  • Opcode ID: be70dd3e98781277891bf0b8bf08dbfe1106c7aa1aa4d4adc42e75c086b44cc4
                                                                  • Instruction ID: dfd478e9582f15ca6f1693502117e16ebc136d62a2a166c5a68ee0b878cc026d
                                                                  • Opcode Fuzzy Hash: be70dd3e98781277891bf0b8bf08dbfe1106c7aa1aa4d4adc42e75c086b44cc4
                                                                  • Instruction Fuzzy Hash: 3231A171901229BFDB209B94DC88EFFBB7EEF01761F000165F945E2200D7B08A49DAA0
                                                                  APIs
                                                                  • timeGetTime.WINMM ref: 0063E6B4
                                                                    • Part of subcall function 005EE551: timeGetTime.WINMM(?,?,0063E6D4), ref: 005EE555
                                                                  • Sleep.KERNEL32(0000000A), ref: 0063E6E1
                                                                  • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0063E705
                                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0063E727
                                                                  • SetActiveWindow.USER32 ref: 0063E746
                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0063E754
                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0063E773
                                                                  • Sleep.KERNEL32(000000FA), ref: 0063E77E
                                                                  • IsWindow.USER32 ref: 0063E78A
                                                                  • EndDialog.USER32(00000000), ref: 0063E79B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                  • String ID: BUTTON
                                                                  • API String ID: 1194449130-3405671355
                                                                  • Opcode ID: 97e801ec6818b365dcc25f22faf7a2578359f7b0b37dd5be96c38cc3226a0a70
                                                                  • Instruction ID: 9aa5ba4d69829e614cace606a023c2c634144f903b6567ad1014d7e6fa1081ff
                                                                  • Opcode Fuzzy Hash: 97e801ec6818b365dcc25f22faf7a2578359f7b0b37dd5be96c38cc3226a0a70
                                                                  • Instruction Fuzzy Hash: D9218770280605AFEB106F64ECA9A353B6BF756358F103425F455826E1DBB2BC50DF74
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0063EA5D
                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0063EA73
                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0063EA84
                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0063EA96
                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0063EAA7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: SendString$_wcslen
                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                  • API String ID: 2420728520-1007645807
                                                                  • Opcode ID: acb191429614bc20b1f45aa90ead2d670d3745f473b8798629ac3f2d882d9f39
                                                                  • Instruction ID: c87eea955759dd34d751e49ef8539c1f4444fee68456355d9d768312b2bfc6bd
                                                                  • Opcode Fuzzy Hash: acb191429614bc20b1f45aa90ead2d670d3745f473b8798629ac3f2d882d9f39
                                                                  • Instruction Fuzzy Hash: 06117331A9036A79DB20A7A6DD4AEFF6E7DFBD1B40F01042AB411A21D1EEB05D05C5B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ._
                                                                  • API String ID: 0-1383207595
                                                                  • Opcode ID: c6046da74ee32863bad3a33c0f03fcb4a48ad124705ae8c501155ea5c34e6372
                                                                  • Instruction ID: 1bc72fd4f94b1963cc535db4c2a95a361662a8a41649221d6c4421be916310c1
                                                                  • Opcode Fuzzy Hash: c6046da74ee32863bad3a33c0f03fcb4a48ad124705ae8c501155ea5c34e6372
                                                                  • Instruction Fuzzy Hash: C0C1F27494424A9FDB19EFA8C844BEEBBB3BF4A310F044099E955A73D2C7349941CB70
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                    • Part of subcall function 005E912D: GetCursorPos.USER32(?), ref: 005E9141
                                                                    • Part of subcall function 005E912D: ScreenToClient.USER32(00000000,?), ref: 005E915E
                                                                    • Part of subcall function 005E912D: GetAsyncKeyState.USER32(00000001), ref: 005E9183
                                                                    • Part of subcall function 005E912D: GetAsyncKeyState.USER32(00000002), ref: 005E919D
                                                                  • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00668B6B
                                                                  • ImageList_EndDrag.COMCTL32 ref: 00668B71
                                                                  • ReleaseCapture.USER32 ref: 00668B77
                                                                  • SetWindowTextW.USER32(?,00000000), ref: 00668C12
                                                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00668C25
                                                                  • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00668CFF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                  • String ID: @GUI_DRAGFILE$@GUI_DROPID$h\$p#j
                                                                  • API String ID: 1924731296-3749715272
                                                                  • Opcode ID: 1c52a976369a9661d2caeaa77b6a8a377341157c784be84fb8c393c39fb09539
                                                                  • Instruction ID: d67ca378416e402af905541a299ad18a223957b657835bf74554b69a3ce06777
                                                                  • Opcode Fuzzy Hash: 1c52a976369a9661d2caeaa77b6a8a377341157c784be84fb8c393c39fb09539
                                                                  • Instruction Fuzzy Hash: 43517D70104345AFD714EF24DC5AFAA7BE6FB85714F00062EF996972A1CB71AD04CB62
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0061F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00639717
                                                                  • LoadStringW.USER32(00000000,?,0061F7F8,00000001), ref: 00639720
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0061F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00639742
                                                                  • LoadStringW.USER32(00000000,?,0061F7F8,00000001), ref: 00639745
                                                                  • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00639866
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: HandleLoadModuleString$Message_wcslen
                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                  • API String ID: 747408836-2268648507
                                                                  • Opcode ID: 0af3c7ced963bf8de1e0a9a553a5c58974246c1b57bd3f7ea71c957f00b29e20
                                                                  • Instruction ID: 5d55f9f25c88d84af912bc4ef2c077a8fae9106387a3cceb7d2ed8518f08cd90
                                                                  • Opcode Fuzzy Hash: 0af3c7ced963bf8de1e0a9a553a5c58974246c1b57bd3f7ea71c957f00b29e20
                                                                  • Instruction Fuzzy Hash: 1D41507290020AAADF14EBE4DE4ADEE7B79AF95740F100426F101B2191EA756F49CFA1
                                                                  APIs
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006307A2
                                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006307BE
                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006307DA
                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00630804
                                                                  • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0063082C
                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00630837
                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0063083C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                  • API String ID: 323675364-22481851
                                                                  • Opcode ID: 7b03e52151ff13ec20abf16daec52e6b4b2053f514f2baabd3bdcbf9de74e1b2
                                                                  • Instruction ID: d7efc9aa40a2554b778dfce0577433214c049fc89ee7dce00d7e17342361b4dd
                                                                  • Opcode Fuzzy Hash: 7b03e52151ff13ec20abf16daec52e6b4b2053f514f2baabd3bdcbf9de74e1b2
                                                                  • Instruction Fuzzy Hash: 5D411D71C10229ABDF21EF98DC99DEDBB79FF44750F14416AE901A3261EB709E04CB90
                                                                  APIs
                                                                  • CreateMenu.USER32 ref: 00663C79
                                                                  • SetMenu.USER32(?,00000000), ref: 00663C88
                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00663D10
                                                                  • IsMenu.USER32(?), ref: 00663D24
                                                                  • CreatePopupMenu.USER32 ref: 00663D2E
                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00663D5B
                                                                  • DrawMenuBar.USER32 ref: 00663D63
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                  • String ID: 0$F$h\
                                                                  • API String ID: 161812096-1380506110
                                                                  • Opcode ID: 3472c236989a0ab27a939e945e624f98501ae22ec9dea5f4b9798ceebf6b62f3
                                                                  • Instruction ID: e293b60c4fa45ac87f6b27b5bc410afb4029268dcf8cd9216fe39f7fd4a54d5c
                                                                  • Opcode Fuzzy Hash: 3472c236989a0ab27a939e945e624f98501ae22ec9dea5f4b9798ceebf6b62f3
                                                                  • Instruction Fuzzy Hash: 67415779A01619AFDB14DF64DC84AEA7BB6FF49350F140029F946A7360D770BA10CF94
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(?), ref: 00653C5C
                                                                  • CoInitialize.OLE32(00000000), ref: 00653C8A
                                                                  • CoUninitialize.OLE32 ref: 00653C94
                                                                  • _wcslen.LIBCMT ref: 00653D2D
                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00653DB1
                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00653ED5
                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00653F0E
                                                                  • CoGetObject.OLE32(?,00000000,0066FB98,?), ref: 00653F2D
                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00653F40
                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00653FC4
                                                                  • VariantClear.OLEAUT32(?), ref: 00653FD8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                  • String ID:
                                                                  • API String ID: 429561992-0
                                                                  • Opcode ID: e09a86eb05eba53ebefbf49462dd3f29b209308a4595083592f206f992157ba3
                                                                  • Instruction ID: f3279b7ea6d2b34149e2c4aae29f0e3c88a5b5e1db50e6a82c2fb60223ce9937
                                                                  • Opcode Fuzzy Hash: e09a86eb05eba53ebefbf49462dd3f29b209308a4595083592f206f992157ba3
                                                                  • Instruction Fuzzy Hash: A4C124716082159FD710DF68C88496BBBEAFF89B85F00491EF9899B310DB71ED09CB52
                                                                  APIs
                                                                  • CoInitialize.OLE32(00000000), ref: 00647AF3
                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00647B8F
                                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00647BA3
                                                                  • CoCreateInstance.OLE32(0066FD08,00000000,00000001,00696E6C,?), ref: 00647BEF
                                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00647C74
                                                                  • CoTaskMemFree.OLE32(?,?), ref: 00647CCC
                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00647D57
                                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00647D7A
                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00647D81
                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00647DD6
                                                                  • CoUninitialize.OLE32 ref: 00647DDC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                  • String ID:
                                                                  • API String ID: 2762341140-0
                                                                  • Opcode ID: a27b3232e14e0e717dd11a305f2c8020c5e92cced5a7b7d0212a1b2f75b2cb2e
                                                                  • Instruction ID: 57e7c121dc91bd78a6fb06850a4ec7e7e7511043d99757078594753bc4d2ce0b
                                                                  • Opcode Fuzzy Hash: a27b3232e14e0e717dd11a305f2c8020c5e92cced5a7b7d0212a1b2f75b2cb2e
                                                                  • Instruction Fuzzy Hash: 1FC11C75A04119AFDB14DFA4C888DAEBBFAFF48314B148499E819DB361DB30ED45CB90
                                                                  APIs
                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0062FAAF
                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 0062FB08
                                                                  • VariantInit.OLEAUT32(?), ref: 0062FB1A
                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 0062FB3A
                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0062FB8D
                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 0062FBA1
                                                                  • VariantClear.OLEAUT32(?), ref: 0062FBB6
                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 0062FBC3
                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0062FBCC
                                                                  • VariantClear.OLEAUT32(?), ref: 0062FBDE
                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0062FBE9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                  • String ID:
                                                                  • API String ID: 2706829360-0
                                                                  • Opcode ID: fadf3d4fadf97bf6e37b56ba335fa938d47199e9a3f1ba8368acf47878041347
                                                                  • Instruction ID: 07121b445461c080848b0c5d7805c651d129eedea14313d86a3750e718707440
                                                                  • Opcode Fuzzy Hash: fadf3d4fadf97bf6e37b56ba335fa938d47199e9a3f1ba8368acf47878041347
                                                                  • Instruction Fuzzy Hash: E7413E35A00619EFCB00DF68D8589EEBBBAFF48355F008079E945A7261CB70A945CFA0
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?), ref: 00639CA1
                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00639D22
                                                                  • GetKeyState.USER32(000000A0), ref: 00639D3D
                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00639D57
                                                                  • GetKeyState.USER32(000000A1), ref: 00639D6C
                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00639D84
                                                                  • GetKeyState.USER32(00000011), ref: 00639D96
                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00639DAE
                                                                  • GetKeyState.USER32(00000012), ref: 00639DC0
                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00639DD8
                                                                  • GetKeyState.USER32(0000005B), ref: 00639DEA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: State$Async$Keyboard
                                                                  • String ID:
                                                                  • API String ID: 541375521-0
                                                                  • Opcode ID: 0b02bc90c1b0209ecabbceb4943271fb4eabe0ddd0cb61155f1719cd0e756690
                                                                  • Instruction ID: e110bc05ed279140b97dd4f8590073aa9db2726244df16d6b0aafccc5dec67f0
                                                                  • Opcode Fuzzy Hash: 0b02bc90c1b0209ecabbceb4943271fb4eabe0ddd0cb61155f1719cd0e756690
                                                                  • Instruction Fuzzy Hash: 9541C434904BCA6DFF30966488053F6BEA2AF11344F04905ADAC6567C2DBE499C8CFF2
                                                                  APIs
                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 006505BC
                                                                  • inet_addr.WSOCK32(?), ref: 0065061C
                                                                  • gethostbyname.WSOCK32(?), ref: 00650628
                                                                  • IcmpCreateFile.IPHLPAPI ref: 00650636
                                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 006506C6
                                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 006506E5
                                                                  • IcmpCloseHandle.IPHLPAPI(?), ref: 006507B9
                                                                  • WSACleanup.WSOCK32 ref: 006507BF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                  • String ID: Ping
                                                                  • API String ID: 1028309954-2246546115
                                                                  • Opcode ID: c7433457a60d25ab1b49fd89643cc77eb01134ea3ec048415ec0500f00ab29c1
                                                                  • Instruction ID: a5a1834051eca0195311beacea884334cf6ec887432b3e44d618d0ed672cdb96
                                                                  • Opcode Fuzzy Hash: c7433457a60d25ab1b49fd89643cc77eb01134ea3ec048415ec0500f00ab29c1
                                                                  • Instruction Fuzzy Hash: E3918F755042029FE320DF15C588F56BBE2BF88318F1485A9F8A98B7A2D770ED49CF81
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$BuffCharLower
                                                                  • String ID: cdecl$none$stdcall$winapi
                                                                  • API String ID: 707087890-567219261
                                                                  • Opcode ID: 8640879aa67072bdad1e666cb4e3611b9a5c8228e64d20bf1ca5e20c4f1d3b70
                                                                  • Instruction ID: 0671e84c3531e38ab7b0cf08ddc4449313f2e259df9819b7a2ae9b091bd4cf26
                                                                  • Opcode Fuzzy Hash: 8640879aa67072bdad1e666cb4e3611b9a5c8228e64d20bf1ca5e20c4f1d3b70
                                                                  • Instruction Fuzzy Hash: 23519D31A001169ECB24DF68C9418FEB7B6BFA4721B20422AE866F7784DB35DD458B90
                                                                  APIs
                                                                  • CoInitialize.OLE32 ref: 00653774
                                                                  • CoUninitialize.OLE32 ref: 0065377F
                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,0066FB78,?), ref: 006537D9
                                                                  • IIDFromString.OLE32(?,?), ref: 0065384C
                                                                  • VariantInit.OLEAUT32(?), ref: 006538E4
                                                                  • VariantClear.OLEAUT32(?), ref: 00653936
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                  • API String ID: 636576611-1287834457
                                                                  • Opcode ID: 80fc31ca1d3ce226134f00ecdc2841ad39409ee2f022ee3b2afd354df3a824ee
                                                                  • Instruction ID: 2687b543cc9e095b3a627cbf083a50df9d6b81da31062d0d7db7bca706ee3116
                                                                  • Opcode Fuzzy Hash: 80fc31ca1d3ce226134f00ecdc2841ad39409ee2f022ee3b2afd354df3a824ee
                                                                  • Instruction Fuzzy Hash: A761C3B06083119FD310DF54C848B6ABBEAEF48B51F00080EF9859B391D770EE49CB96
                                                                  APIs
                                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 006433CF
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 006433F0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LoadString$_wcslen
                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                  • API String ID: 4099089115-3080491070
                                                                  • Opcode ID: 8392d6b4e5704aeb75e1d9e62732d25b6006ad2e33ab1b62075941286e75b43c
                                                                  • Instruction ID: 5828981aab4dad86e1ccdc21bb3772fb76c2936f21bd3a1bcd32a145e8c012df
                                                                  • Opcode Fuzzy Hash: 8392d6b4e5704aeb75e1d9e62732d25b6006ad2e33ab1b62075941286e75b43c
                                                                  • Instruction Fuzzy Hash: 7551C37190021AAADF24EBE4CD46EEEBB7ABF54740F104066F405722A1EB712F58DF61
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$BuffCharUpper
                                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                  • API String ID: 1256254125-769500911
                                                                  • Opcode ID: ec78ff44404e4fd00ba710977c73a0a08e23d73c96da6041e1476ee54f5aa4c2
                                                                  • Instruction ID: dd908bad93d1ce31b0aee563342615ca599178ef9b57752c9257bf1e4fbff34b
                                                                  • Opcode Fuzzy Hash: ec78ff44404e4fd00ba710977c73a0a08e23d73c96da6041e1476ee54f5aa4c2
                                                                  • Instruction Fuzzy Hash: CB41F332A001279ACB205E7DC9925FE7BA6BBA2754F245129E621DB385E731CC81C7D0
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001), ref: 006453A0
                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00645416
                                                                  • GetLastError.KERNEL32 ref: 00645420
                                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 006454A7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                  • API String ID: 4194297153-14809454
                                                                  • Opcode ID: 67ff6af5a45fc86db349dc1e039d3596bd56b02062e8fe500ba5c7521e02e210
                                                                  • Instruction ID: df34ea42077dd93a64679dbab0a85e83b8af13cbc21152acdb305ec2ec275fa1
                                                                  • Opcode Fuzzy Hash: 67ff6af5a45fc86db349dc1e039d3596bd56b02062e8fe500ba5c7521e02e210
                                                                  • Instruction Fuzzy Hash: 8F316D35A006059FCB10DF68C488AEABBFAEF45345F148066E406DF3A2DB71DD86CB91
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0063B151
                                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0063A1E1,?,00000001), ref: 0063B165
                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 0063B16C
                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0063A1E1,?,00000001), ref: 0063B17B
                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0063B18D
                                                                  • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0063A1E1,?,00000001), ref: 0063B1A6
                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0063A1E1,?,00000001), ref: 0063B1B8
                                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0063A1E1,?,00000001), ref: 0063B1FD
                                                                  • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0063A1E1,?,00000001), ref: 0063B212
                                                                  • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0063A1E1,?,00000001), ref: 0063B21D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                  • String ID:
                                                                  • API String ID: 2156557900-0
                                                                  • Opcode ID: e803eb4aab7e4407211437e906204a3121f10bd87a0b8e68fdf8ba2306de1867
                                                                  • Instruction ID: 1f8677ab8368066cf292dcebb59de1a1ce4ffea70337c75d784e1184b16d6956
                                                                  • Opcode Fuzzy Hash: e803eb4aab7e4407211437e906204a3121f10bd87a0b8e68fdf8ba2306de1867
                                                                  • Instruction Fuzzy Hash: C9319C71500614BFDB10AF24DC49BBEBBABBB52321F146115FA02D6390D7B5AA408FA4
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00602C94
                                                                    • Part of subcall function 006029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000), ref: 006029DE
                                                                    • Part of subcall function 006029C8: GetLastError.KERNEL32(00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000,00000000), ref: 006029F0
                                                                  • _free.LIBCMT ref: 00602CA0
                                                                  • _free.LIBCMT ref: 00602CAB
                                                                  • _free.LIBCMT ref: 00602CB6
                                                                  • _free.LIBCMT ref: 00602CC1
                                                                  • _free.LIBCMT ref: 00602CCC
                                                                  • _free.LIBCMT ref: 00602CD7
                                                                  • _free.LIBCMT ref: 00602CE2
                                                                  • _free.LIBCMT ref: 00602CED
                                                                  • _free.LIBCMT ref: 00602CFB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 85fef346c535f288309e4060a1ea722b2f831f2609e3f17c6314a2b332e34836
                                                                  • Instruction ID: 68fccbbe7df5b585ea8181556d0a592cc3da6132ceeb441d13e58c3a6764b0a7
                                                                  • Opcode Fuzzy Hash: 85fef346c535f288309e4060a1ea722b2f831f2609e3f17c6314a2b332e34836
                                                                  • Instruction Fuzzy Hash: 87112B36140009BFCB4AEF55D856CDE3BAAFF05740F5048A8F9485F272D631EE509B94
                                                                  APIs
                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 005D1459
                                                                  • OleUninitialize.OLE32(?,00000000), ref: 005D14F8
                                                                  • UnregisterHotKey.USER32(?), ref: 005D16DD
                                                                  • DestroyWindow.USER32(?), ref: 006124B9
                                                                  • FreeLibrary.KERNEL32(?), ref: 0061251E
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0061254B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                  • String ID: close all
                                                                  • API String ID: 469580280-3243417748
                                                                  • Opcode ID: 2a482affc823d30e2ec878408ef3c673257ac9909047ddcf41092191085f38b9
                                                                  • Instruction ID: 5895fe6c6cfae3f25d7ebed209473f0b1c5ddb1aeb7784882b9cba4c1cbc290c
                                                                  • Opcode Fuzzy Hash: 2a482affc823d30e2ec878408ef3c673257ac9909047ddcf41092191085f38b9
                                                                  • Instruction Fuzzy Hash: 71D18E307016139FCB29EF19C4A9AA9FBA6BF45710F14419EE44AAB351CB30ED62CF54
                                                                  APIs
                                                                  • SetWindowLongW.USER32(?,000000EB), ref: 005D5C7A
                                                                    • Part of subcall function 005D5D0A: GetClientRect.USER32(?,?), ref: 005D5D30
                                                                    • Part of subcall function 005D5D0A: GetWindowRect.USER32(?,?), ref: 005D5D71
                                                                    • Part of subcall function 005D5D0A: ScreenToClient.USER32(?,?), ref: 005D5D99
                                                                  • GetDC.USER32 ref: 006146F5
                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00614708
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00614716
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0061472B
                                                                  • ReleaseDC.USER32(?,00000000), ref: 00614733
                                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006147C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                  • String ID: U
                                                                  • API String ID: 4009187628-3372436214
                                                                  • Opcode ID: 3c7e5b60904d353303571b403a8732dfc511080f96a51a8c158ebd71c51899ee
                                                                  • Instruction ID: ddfc960d4ed7141d0b819b8bc971a4565d986311ee431bdf3f5564557c40612b
                                                                  • Opcode Fuzzy Hash: 3c7e5b60904d353303571b403a8732dfc511080f96a51a8c158ebd71c51899ee
                                                                  • Instruction Fuzzy Hash: F271EE30500205DFCF218F68C984AFA3BB7FF4A325F18426AE9555B2A6DB319C81DF60
                                                                  APIs
                                                                  • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006435E4
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • LoadStringW.USER32(006A2390,?,00000FFF,?), ref: 0064360A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LoadString$_wcslen
                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                  • API String ID: 4099089115-2391861430
                                                                  • Opcode ID: 48ecb2ed643e236bfc9968fd8b22cbeb72cf053b698863f08412ddf2d8aea7eb
                                                                  • Instruction ID: 9b88dbae819ee5f896fbb66799d8a535925798eace97b0c9a9a0d9ad2e86ac94
                                                                  • Opcode Fuzzy Hash: 48ecb2ed643e236bfc9968fd8b22cbeb72cf053b698863f08412ddf2d8aea7eb
                                                                  • Instruction Fuzzy Hash: D151A37180021ABBDF24EBA4DC46EEEBB7ABF45300F144126F105722A1DB301B95DFA5
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00662E1C
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00662E4F
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00662E84
                                                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00662EB6
                                                                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00662EE0
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00662EF1
                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00662F0B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$MessageSend
                                                                  • String ID: h\
                                                                  • API String ID: 2178440468-2592641360
                                                                  • Opcode ID: 27f7186bf049e7bf18a36f22872fe7d23367088a82cc46e9b6593c3be652f677
                                                                  • Instruction ID: 16d2e1828092397ec0e5d10790f19f61bcad6a58db12af7a81f42f37dee1f1a6
                                                                  • Opcode Fuzzy Hash: 27f7186bf049e7bf18a36f22872fe7d23367088a82cc46e9b6593c3be652f677
                                                                  • Instruction Fuzzy Hash: 6E3115306449429FDB20DF59DC94FA537E2FB5A720F1411A5FA50CF2B1CBB2A840DB41
                                                                  APIs
                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0064C272
                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0064C29A
                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0064C2CA
                                                                  • GetLastError.KERNEL32 ref: 0064C322
                                                                  • SetEvent.KERNEL32(?), ref: 0064C336
                                                                  • InternetCloseHandle.WININET(00000000), ref: 0064C341
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                  • String ID:
                                                                  • API String ID: 3113390036-3916222277
                                                                  • Opcode ID: d162ce8ba685d472b33129d302cc15aece2cd5eddc487a27af680bf56fa8bde2
                                                                  • Instruction ID: 863ee70b6bee281cc6e6608e8ffd2bb2dee60bbb668c66138a6019a83629f9c4
                                                                  • Opcode Fuzzy Hash: d162ce8ba685d472b33129d302cc15aece2cd5eddc487a27af680bf56fa8bde2
                                                                  • Instruction Fuzzy Hash: BD31B1B1601604AFD7629F648C88ABB7BFEEF49760F00851DF48692300DB70DD059B60
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00613AAF,?,?,Bad directive syntax error,0066CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 006398BC
                                                                  • LoadStringW.USER32(00000000,?,00613AAF,?), ref: 006398C3
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00639987
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: HandleLoadMessageModuleString_wcslen
                                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                  • API String ID: 858772685-4153970271
                                                                  • Opcode ID: 27c32ea57a7aa77af9994de994623ec4abbd00dfe767b6c28e6703d6c9a2c33b
                                                                  • Instruction ID: 608ba5ac0e666e773fe58f734e494c7cb84010d1214de0c129a3d63e26990899
                                                                  • Opcode Fuzzy Hash: 27c32ea57a7aa77af9994de994623ec4abbd00dfe767b6c28e6703d6c9a2c33b
                                                                  • Instruction Fuzzy Hash: B721943190021EABDF25AF94CC0AEEE7B7AFF18700F04442BF515661A1DB719A28DF61
                                                                  APIs
                                                                  • GetParent.USER32 ref: 006320AB
                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 006320C0
                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0063214D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ClassMessageNameParentSend
                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                  • API String ID: 1290815626-3381328864
                                                                  • Opcode ID: af016500c36db37f76333a16bf42a5a47c1a9240dd3c61cdd677b3e35676d275
                                                                  • Instruction ID: 5c965206ccaa653841374b03f4ae521a611c325fd9ed8310fc175e229daac4dd
                                                                  • Opcode Fuzzy Hash: af016500c36db37f76333a16bf42a5a47c1a9240dd3c61cdd677b3e35676d275
                                                                  • Instruction Fuzzy Hash: DE115C7728870BBAFA012220DC2BCF7379FDB05324F200116F705E41D5FEB568425A58
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                  • String ID:
                                                                  • API String ID: 1282221369-0
                                                                  • Opcode ID: f0e35a9732e993ef6100ac90dd81899d03a24fe7cf3aa6708b2ab7e9787b6e20
                                                                  • Instruction ID: e9ee42dc088ee0b199f43fd43d0941ff37eee69336ff849840c7916f3c45fbf9
                                                                  • Opcode Fuzzy Hash: f0e35a9732e993ef6100ac90dd81899d03a24fe7cf3aa6708b2ab7e9787b6e20
                                                                  • Instruction Fuzzy Hash: 426178B2984302AFDB2DBFB49895AAF7BA7AF01330F14426DF905A73C1D6319D018751
                                                                  APIs
                                                                  • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00626890
                                                                  • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 006268A9
                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006268B9
                                                                  • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 006268D1
                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006268F2
                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,005E8874,00000000,00000000,00000000,000000FF,00000000), ref: 00626901
                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0062691E
                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,005E8874,00000000,00000000,00000000,000000FF,00000000), ref: 0062692D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                  • String ID:
                                                                  • API String ID: 1268354404-0
                                                                  • Opcode ID: e76c088c221df7f154a164e809b622347962c04480cdfb56cce4300c6e9b0804
                                                                  • Instruction ID: b1534bdf575b333ed3ef6dbe8d43f5104f3f3c5d2dbef71a4c8b95d11cbf1c0c
                                                                  • Opcode Fuzzy Hash: e76c088c221df7f154a164e809b622347962c04480cdfb56cce4300c6e9b0804
                                                                  • Instruction Fuzzy Hash: 89519B70A00A09EFDB24DF25DC55BBA7BBAFB44360F104518F996972A0DBB0E990DF50
                                                                  APIs
                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0064C182
                                                                  • GetLastError.KERNEL32 ref: 0064C195
                                                                  • SetEvent.KERNEL32(?), ref: 0064C1A9
                                                                    • Part of subcall function 0064C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0064C272
                                                                    • Part of subcall function 0064C253: GetLastError.KERNEL32 ref: 0064C322
                                                                    • Part of subcall function 0064C253: SetEvent.KERNEL32(?), ref: 0064C336
                                                                    • Part of subcall function 0064C253: InternetCloseHandle.WININET(00000000), ref: 0064C341
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                  • String ID:
                                                                  • API String ID: 337547030-0
                                                                  • Opcode ID: 97a99c1f1e2b933b6b4453723b468182dc5b91018e331e3253eb33441718b073
                                                                  • Instruction ID: 815e09d4c6fb642dc824b29216ce790dafca816c4c382452e62a6c3efc6473bc
                                                                  • Opcode Fuzzy Hash: 97a99c1f1e2b933b6b4453723b468182dc5b91018e331e3253eb33441718b073
                                                                  • Instruction Fuzzy Hash: 4C31AF71202A41AFDB619FB5DC04AB7BBFAFF18320B00442DF99683720D7B1E9149B60
                                                                  APIs
                                                                    • Part of subcall function 00633A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00633A57
                                                                    • Part of subcall function 00633A3D: GetCurrentThreadId.KERNEL32 ref: 00633A5E
                                                                    • Part of subcall function 00633A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006325B3), ref: 00633A65
                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 006325BD
                                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006325DB
                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 006325DF
                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 006325E9
                                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00632601
                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00632605
                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 0063260F
                                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00632623
                                                                  • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00632627
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                  • String ID:
                                                                  • API String ID: 2014098862-0
                                                                  • Opcode ID: c3e99a4757f0309f3e4b076d5f1779d2f041d1d984f573f563204ba82770d9bd
                                                                  • Instruction ID: 0904cc804aeaf34d170005ce9980b9601eca4e19e89337dbd1d469902f9139fd
                                                                  • Opcode Fuzzy Hash: c3e99a4757f0309f3e4b076d5f1779d2f041d1d984f573f563204ba82770d9bd
                                                                  • Instruction Fuzzy Hash: F801D430390620BBFB107768DC8AF697F5ADF4EB22F101005F358AE1E1C9E224449AAD
                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00631449,?,?,00000000), ref: 0063180C
                                                                  • HeapAlloc.KERNEL32(00000000,?,00631449,?,?,00000000), ref: 00631813
                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00631449,?,?,00000000), ref: 00631828
                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00631449,?,?,00000000), ref: 00631830
                                                                  • DuplicateHandle.KERNEL32(00000000,?,00631449,?,?,00000000), ref: 00631833
                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00631449,?,?,00000000), ref: 00631843
                                                                  • GetCurrentProcess.KERNEL32(00631449,00000000,?,00631449,?,?,00000000), ref: 0063184B
                                                                  • DuplicateHandle.KERNEL32(00000000,?,00631449,?,?,00000000), ref: 0063184E
                                                                  • CreateThread.KERNEL32(00000000,00000000,00631874,00000000,00000000,00000000), ref: 00631868
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                  • String ID:
                                                                  • API String ID: 1957940570-0
                                                                  • Opcode ID: 72f453b8f28487469c631f718bad289312bc33fc8cbe9bccfed639d0a269c31f
                                                                  • Instruction ID: 3f5251d1d2d6fa9ec6c5f79e71afa8073d3befdad6d0ff869fda58354c4dce0e
                                                                  • Opcode Fuzzy Hash: 72f453b8f28487469c631f718bad289312bc33fc8cbe9bccfed639d0a269c31f
                                                                  • Instruction Fuzzy Hash: 2C01BF75240744BFE710AB66DC4DF677B6DEB8AB11F015411FA45DB191C6B19800CB70
                                                                  APIs
                                                                    • Part of subcall function 0063D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0063D501
                                                                    • Part of subcall function 0063D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0063D50F
                                                                    • Part of subcall function 0063D4DC: CloseHandle.KERNEL32(00000000), ref: 0063D5DC
                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0065A16D
                                                                  • GetLastError.KERNEL32 ref: 0065A180
                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0065A1B3
                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0065A268
                                                                  • GetLastError.KERNEL32(00000000), ref: 0065A273
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0065A2C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                  • String ID: SeDebugPrivilege
                                                                  • API String ID: 2533919879-2896544425
                                                                  • Opcode ID: 9aaaeb92580bc8c1f8feda807ca6ad5acd0d070e976b5c9d6fc5ca47e89e3f2e
                                                                  • Instruction ID: bf6c5d43c8ee21a2373118a232c190e429e819f6775f3a2a152dc8d32a002c77
                                                                  • Opcode Fuzzy Hash: 9aaaeb92580bc8c1f8feda807ca6ad5acd0d070e976b5c9d6fc5ca47e89e3f2e
                                                                  • Instruction Fuzzy Hash: 8661D2302046429FD720DF58C495F65BBE2AF44318F18858DE8568F7A3C772ED4ACB92
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00663925
                                                                  • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0066393A
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00663954
                                                                  • _wcslen.LIBCMT ref: 00663999
                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 006639C6
                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 006639F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window_wcslen
                                                                  • String ID: SysListView32
                                                                  • API String ID: 2147712094-78025650
                                                                  • Opcode ID: c46bf5a31997b954892b54f284157415ced305eb64a3966ad0169ec524b0ac6d
                                                                  • Instruction ID: 1b063f4dd4a6850800b7b32d94a1f9a5663eb7df50319cae4b11b00a2d380972
                                                                  • Opcode Fuzzy Hash: c46bf5a31997b954892b54f284157415ced305eb64a3966ad0169ec524b0ac6d
                                                                  • Instruction Fuzzy Hash: 7A419671A00219ABDF219F64CC49FEA7BAAFF48350F10052AF558E7381D7B59D80CB94
                                                                  APIs
                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0063BCFD
                                                                  • IsMenu.USER32(00000000), ref: 0063BD1D
                                                                  • CreatePopupMenu.USER32 ref: 0063BD53
                                                                  • GetMenuItemCount.USER32(00E25CB8), ref: 0063BDA4
                                                                  • InsertMenuItemW.USER32(00E25CB8,?,00000001,00000030), ref: 0063BDCC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                  • String ID: 0$2
                                                                  • API String ID: 93392585-3793063076
                                                                  • Opcode ID: c6744da1632def50c51612f8b47dbc7924480e5607b454becbe692e951432f0d
                                                                  • Instruction ID: 6f515f744df3bbc0cc85951e5b893ac5acd14c2f592daf820fd542454f8a80fe
                                                                  • Opcode Fuzzy Hash: c6744da1632def50c51612f8b47dbc7924480e5607b454becbe692e951432f0d
                                                                  • Instruction Fuzzy Hash: D751AF70A002099BDF20DFA8D884BEEBBF6BF45324F146159E651E7391D7709941CBA1
                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 005F2D4B
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 005F2D53
                                                                  • _ValidateLocalCookies.LIBCMT ref: 005F2DE1
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 005F2E0C
                                                                  • _ValidateLocalCookies.LIBCMT ref: 005F2E61
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: &H_$csm
                                                                  • API String ID: 1170836740-4263142645
                                                                  • Opcode ID: ed42c63b08778af9c82b708a3ed9116dce9c86e1e3c3dbe731a40205c93cc977
                                                                  • Instruction ID: 9141ff5196133bf16a7e57f45c92cb4b7ba2c9bd8752fba5ac7c59d45926c66d
                                                                  • Opcode Fuzzy Hash: ed42c63b08778af9c82b708a3ed9116dce9c86e1e3c3dbe731a40205c93cc977
                                                                  • Instruction Fuzzy Hash: C841B374A0020DABCF14DF68C845ABEBFB5BF85324F148155EA14AB392D7399E02CB90
                                                                  APIs
                                                                  • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0062F3AB,00000000,?,?,00000000,?,0062682C,00000004,00000000,00000000), ref: 0066824C
                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00668272
                                                                  • ShowWindow.USER32(FFFFFFFF,00000000), ref: 006682D1
                                                                  • ShowWindow.USER32(00000000,00000004), ref: 006682E5
                                                                  • EnableWindow.USER32(00000000,00000001), ref: 0066830B
                                                                  • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0066832F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                  • String ID: h\
                                                                  • API String ID: 642888154-2592641360
                                                                  • Opcode ID: 4327852f2f147358dfe4da34a10242dde631cb513f9fe01affa4153dcfd40f13
                                                                  • Instruction ID: ca258019e13cc1bcd160fc87b0a34c4b1a59a88d5ee1cf69eaa9e23fa111438e
                                                                  • Opcode Fuzzy Hash: 4327852f2f147358dfe4da34a10242dde631cb513f9fe01affa4153dcfd40f13
                                                                  • Instruction Fuzzy Hash: BF41D230601640AFDB21CF25C8A9BE47BE7BB0A714F1813A9E5485F3A2CB31A941CF80
                                                                  APIs
                                                                  • LoadIconW.USER32(00000000,00007F03), ref: 0063C913
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: IconLoad
                                                                  • String ID: blank$info$question$stop$warning
                                                                  • API String ID: 2457776203-404129466
                                                                  • Opcode ID: 97cbc55fb2942a61284626a910b9c6d0ff512f61a8260dd2e12aaf215db81bce
                                                                  • Instruction ID: 0c6326e87ceac194363477dad31ebc8a6e6e1ac16b56b4573245564e4c2de26c
                                                                  • Opcode Fuzzy Hash: 97cbc55fb2942a61284626a910b9c6d0ff512f61a8260dd2e12aaf215db81bce
                                                                  • Instruction Fuzzy Hash: E6112B3268930BBAEB009B54DC82DEB7B9EDF15334F11006AF504BA2C2D7B46F4057A4
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$LocalTime
                                                                  • String ID:
                                                                  • API String ID: 952045576-0
                                                                  • Opcode ID: 624077caa4f46c24b695e828190bd3dd4f9832442a63aaf8a835c026755f1eba
                                                                  • Instruction ID: db8877e9271e4a09b3418a43392877701a6f4074f6bc6d7bff16a1668814fcc9
                                                                  • Opcode Fuzzy Hash: 624077caa4f46c24b695e828190bd3dd4f9832442a63aaf8a835c026755f1eba
                                                                  • Instruction Fuzzy Hash: 4C41D069C0021D75CB10EBB4888E9DFBBB9BF85700F008466E618E3161FB38E241C3E5
                                                                  APIs
                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0062682C,00000004,00000000,00000000), ref: 005EF953
                                                                  • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0062682C,00000004,00000000,00000000), ref: 0062F3D1
                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0062682C,00000004,00000000,00000000), ref: 0062F454
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow
                                                                  • String ID:
                                                                  • API String ID: 1268545403-0
                                                                  • Opcode ID: f029eada80fb4e1a5369ff2477d86b1ba212b01ff9a5bc5898f545380791ba17
                                                                  • Instruction ID: 1d6c52a973114ee2cc03724244e2e594f7a16fda366064af8acb072902786939
                                                                  • Opcode Fuzzy Hash: f029eada80fb4e1a5369ff2477d86b1ba212b01ff9a5bc5898f545380791ba17
                                                                  • Instruction Fuzzy Hash: 5841F931508AC0BAC73D9B2AD89877A7FA3BB56320F15543DE0C7D6562CE71A880CF51
                                                                  APIs
                                                                  • DeleteObject.GDI32(00000000), ref: 00662D1B
                                                                  • GetDC.USER32(00000000), ref: 00662D23
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00662D2E
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00662D3A
                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00662D76
                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00662D87
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00665A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00662DC2
                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00662DE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                  • String ID:
                                                                  • API String ID: 3864802216-0
                                                                  • Opcode ID: 96a7dbec3cdc5b53510bdab8de87a4b700476c50ba2e16f88fae0deac07df625
                                                                  • Instruction ID: 7027aa665aaafc881097522dec8ebea18e5ab7f8ccf0bdec9ea0029a54f5684d
                                                                  • Opcode Fuzzy Hash: 96a7dbec3cdc5b53510bdab8de87a4b700476c50ba2e16f88fae0deac07df625
                                                                  • Instruction Fuzzy Hash: FF316B72201A54BBEB118F50CC8AFFB3BAAEF09725F045055FE48DA291C6B59C50CBA4
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _memcmp
                                                                  • String ID:
                                                                  • API String ID: 2931989736-0
                                                                  • Opcode ID: 4cdaf7aa333f1d5a95103372e5773d8869a18ef190998c82a42b92b4c15ce6f1
                                                                  • Instruction ID: 88bfbd1ba3f2ef85bea777d47250ff4ee33099fd916670bc4a0081d5a0b68a1e
                                                                  • Opcode Fuzzy Hash: 4cdaf7aa333f1d5a95103372e5773d8869a18ef190998c82a42b92b4c15ce6f1
                                                                  • Instruction Fuzzy Hash: C921C5B1644E0AB7D21456209D93FFB235FAF62384F850420FE079B691F725ED11C1E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                                  • API String ID: 0-572801152
                                                                  • Opcode ID: 4d5f5f9fb9c710e1066cad88a5858db0f2d3a2ebae8b910034406709526f8af1
                                                                  • Instruction ID: fc5d930ff26a4b2f75c0d0aa2d4d4deec3f46a1cab42d899609ba02c801a7a93
                                                                  • Opcode Fuzzy Hash: 4d5f5f9fb9c710e1066cad88a5858db0f2d3a2ebae8b910034406709526f8af1
                                                                  • Instruction Fuzzy Hash: 5ED1C271A0060A9FDF10CF98C895BEEB7B6BF48355F148069E916AB380E771DD49CB90
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,006117FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 006115CE
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00611651
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,006117FB,?,006117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006116E4
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006116FB
                                                                    • Part of subcall function 00603820: RtlAllocateHeap.NTDLL(00000000,?,006A1444,?,005EFDF5,?,?,005DA976,00000010,006A1440,005D13FC,?,005D13C6,?,005D1129), ref: 00603852
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,006117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00611777
                                                                  • __freea.LIBCMT ref: 006117A2
                                                                  • __freea.LIBCMT ref: 006117AE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                  • String ID:
                                                                  • API String ID: 2829977744-0
                                                                  • Opcode ID: b75f48e45a75d24729a0b7fa591b12ba62e75b77fdb14ec279c24783261a7b68
                                                                  • Instruction ID: 1ae64228f69ea94145ec1c10e95eca12e64be0f845505b686e0ee145724be94a
                                                                  • Opcode Fuzzy Hash: b75f48e45a75d24729a0b7fa591b12ba62e75b77fdb14ec279c24783261a7b68
                                                                  • Instruction Fuzzy Hash: 6E91A4B1E002169ADF248E74C851AEEBBB79F4A310F1C4659EA01EF391D735DD81C7A0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearInit
                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                  • API String ID: 2610073882-625585964
                                                                  • Opcode ID: 6cf008b62ef860ed1f77f051410b9d41d43e6f08e7f954fef215cacc559b1748
                                                                  • Instruction ID: 18dc580a4945ba32eac89601a2237c15c383ce908f9ed767edbed9874a62ef0c
                                                                  • Opcode Fuzzy Hash: 6cf008b62ef860ed1f77f051410b9d41d43e6f08e7f954fef215cacc559b1748
                                                                  • Instruction Fuzzy Hash: 85918471A00215ABDF24CFA5C844FEE7BBAEF45715F108599F905AB280DB709989CFA0
                                                                  APIs
                                                                  • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0064125C
                                                                  • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00641284
                                                                  • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 006412A8
                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006412D8
                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0064135F
                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006413C4
                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00641430
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                  • String ID:
                                                                  • API String ID: 2550207440-0
                                                                  • Opcode ID: 57e32a764ff755d896e118fa3efcf38ec5730b51a78d50d4be5c755d78fc6eb4
                                                                  • Instruction ID: a7012340d8a6f634200d43cb116d6ada5aa1a2a16b4fbac0fae1a2460c64138a
                                                                  • Opcode Fuzzy Hash: 57e32a764ff755d896e118fa3efcf38ec5730b51a78d50d4be5c755d78fc6eb4
                                                                  • Instruction Fuzzy Hash: 3B91D375A002199FDB01DF98C885BFEB7F6FF46325F144029E540EB291D7B4A981CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                  • String ID:
                                                                  • API String ID: 3225163088-0
                                                                  • Opcode ID: 743f8843ca9a2c921c92c0637bb133ff3b13d9ace2a7ffa04c0c98a5fa9cb778
                                                                  • Instruction ID: 2c0222e228939eb3eed1f48f2af99689ed62d354bdd2d7a0091f6280e357d384
                                                                  • Opcode Fuzzy Hash: 743f8843ca9a2c921c92c0637bb133ff3b13d9ace2a7ffa04c0c98a5fa9cb778
                                                                  • Instruction Fuzzy Hash: F5913671D0025AEFCB14CFA9C888AEEBFB9FF88320F144446E555B7251D275AA41CBA0
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(?), ref: 0065396B
                                                                  • CharUpperBuffW.USER32(?,?), ref: 00653A7A
                                                                  • _wcslen.LIBCMT ref: 00653A8A
                                                                  • VariantClear.OLEAUT32(?), ref: 00653C1F
                                                                    • Part of subcall function 00640CDF: VariantInit.OLEAUT32(00000000), ref: 00640D1F
                                                                    • Part of subcall function 00640CDF: VariantCopy.OLEAUT32(?,?), ref: 00640D28
                                                                    • Part of subcall function 00640CDF: VariantClear.OLEAUT32(?), ref: 00640D34
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                  • API String ID: 4137639002-1221869570
                                                                  • Opcode ID: bb8dcda8ea3e82faf5a923e65d47d3fa7bfec332882edd5bf97864eacc2a56b7
                                                                  • Instruction ID: 2d8243f4e40720f9f156b10150ac1f0f202c348214d09616bc49f808511ef112
                                                                  • Opcode Fuzzy Hash: bb8dcda8ea3e82faf5a923e65d47d3fa7bfec332882edd5bf97864eacc2a56b7
                                                                  • Instruction Fuzzy Hash: C2919D746083059FC714DF28C48486ABBE6FF88755F04892EF8898B351DB31EE09CB92
                                                                  APIs
                                                                    • Part of subcall function 0063000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?,?,?,0063035E), ref: 0063002B
                                                                    • Part of subcall function 0063000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?,?), ref: 00630046
                                                                    • Part of subcall function 0063000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?,?), ref: 00630054
                                                                    • Part of subcall function 0063000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?), ref: 00630064
                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00654C51
                                                                  • _wcslen.LIBCMT ref: 00654D59
                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00654DCF
                                                                  • CoTaskMemFree.OLE32(?), ref: 00654DDA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                  • String ID: NULL Pointer assignment
                                                                  • API String ID: 614568839-2785691316
                                                                  • Opcode ID: 03f951388b3916c494d3beca379a2b0b0bea69dd1704f032df58a8e888948aa6
                                                                  • Instruction ID: 2620334fe04639bd465e6382871a0126529c4807b3ce8e84fd85c7b7e064969d
                                                                  • Opcode Fuzzy Hash: 03f951388b3916c494d3beca379a2b0b0bea69dd1704f032df58a8e888948aa6
                                                                  • Instruction Fuzzy Hash: 94914971D0021DAFDF24DFA4D895AEEBBB9BF48314F10416AE915A7241DB309E49CFA0
                                                                  APIs
                                                                  • GetMenu.USER32(?), ref: 00662183
                                                                  • GetMenuItemCount.USER32(00000000), ref: 006621B5
                                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 006621DD
                                                                  • _wcslen.LIBCMT ref: 00662213
                                                                  • GetMenuItemID.USER32(?,?), ref: 0066224D
                                                                  • GetSubMenu.USER32(?,?), ref: 0066225B
                                                                    • Part of subcall function 00633A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00633A57
                                                                    • Part of subcall function 00633A3D: GetCurrentThreadId.KERNEL32 ref: 00633A5E
                                                                    • Part of subcall function 00633A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006325B3), ref: 00633A65
                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006622E3
                                                                    • Part of subcall function 0063E97B: Sleep.KERNEL32 ref: 0063E9F3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                  • String ID:
                                                                  • API String ID: 4196846111-0
                                                                  • Opcode ID: 0b8cd4f4b440be47fd04632d27061d96e6b54379c3e45bd1ba9711cc2ef678bc
                                                                  • Instruction ID: aa57f621f6c066d5ee869b0de1ed9e4a5c652c73581809ed2522e4baaf15b14b
                                                                  • Opcode Fuzzy Hash: 0b8cd4f4b440be47fd04632d27061d96e6b54379c3e45bd1ba9711cc2ef678bc
                                                                  • Instruction Fuzzy Hash: 04718275E00606AFCB10DF64C855AAEBBF6FF88320F148459E956EB341D774EE418B90
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 0063AEF9
                                                                  • GetKeyboardState.USER32(?), ref: 0063AF0E
                                                                  • SetKeyboardState.USER32(?), ref: 0063AF6F
                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 0063AF9D
                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 0063AFBC
                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 0063AFFD
                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0063B020
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                  • String ID:
                                                                  • API String ID: 87235514-0
                                                                  • Opcode ID: 3b59f66234a13ebff61d0200ea54752cda9b2994ba01e1a75b44f2225766b9ab
                                                                  • Instruction ID: 9ed5f08e0dd6e1ac1d09483020db6aeb240023d74cf91f84684dd43b41116077
                                                                  • Opcode Fuzzy Hash: 3b59f66234a13ebff61d0200ea54752cda9b2994ba01e1a75b44f2225766b9ab
                                                                  • Instruction Fuzzy Hash: D151D0A06046D53DFB364274CC45BFBBEAA5B06304F08958DE2D9999C2C3D8A8C8E791
                                                                  APIs
                                                                  • GetParent.USER32(00000000), ref: 0063AD19
                                                                  • GetKeyboardState.USER32(?), ref: 0063AD2E
                                                                  • SetKeyboardState.USER32(?), ref: 0063AD8F
                                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0063ADBB
                                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0063ADD8
                                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0063AE17
                                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0063AE38
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                  • String ID:
                                                                  • API String ID: 87235514-0
                                                                  • Opcode ID: a397d1908220d58d4c90a1084905ceed6e1daf086ba55738288a047b86c2ef8d
                                                                  • Instruction ID: 3612924afc21cb8f74daeb7c110089362c1b330a09b457ecd0ced91c941976b5
                                                                  • Opcode Fuzzy Hash: a397d1908220d58d4c90a1084905ceed6e1daf086ba55738288a047b86c2ef8d
                                                                  • Instruction Fuzzy Hash: 0651D4B16047D53DFB3683B4CC55BBA7EAA5F46300F088588E1D54A9C2D294ED88F7E2
                                                                  APIs
                                                                  • GetConsoleCP.KERNEL32(00613CD6,?,?,?,?,?,?,?,?,00605BA3,?,?,00613CD6,?,?), ref: 00605470
                                                                  • __fassign.LIBCMT ref: 006054EB
                                                                  • __fassign.LIBCMT ref: 00605506
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00613CD6,00000005,00000000,00000000), ref: 0060552C
                                                                  • WriteFile.KERNEL32(?,00613CD6,00000000,00605BA3,00000000,?,?,?,?,?,?,?,?,?,00605BA3,?), ref: 0060554B
                                                                  • WriteFile.KERNEL32(?,?,00000001,00605BA3,00000000,?,?,?,?,?,?,?,?,?,00605BA3,?), ref: 00605584
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1324828854-0
                                                                  • Opcode ID: 3583c4418a844214423aa3c6d6d974fd5d2cfafdabe249e6cc4a2daf79bb2dc3
                                                                  • Instruction ID: 1ac741aea1acae8a48eafcfb1596d3b384a42c46ab89f9657dc4abec43d48c12
                                                                  • Opcode Fuzzy Hash: 3583c4418a844214423aa3c6d6d974fd5d2cfafdabe249e6cc4a2daf79bb2dc3
                                                                  • Instruction Fuzzy Hash: F651C070A006499FDB15CFA8DC45AEFBBFAEF09300F14455AE956E7291E730AA41CF60
                                                                  APIs
                                                                  • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00666C33
                                                                  • SetWindowLongW.USER32(?,000000EC,?), ref: 00666C4A
                                                                  • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00666C73
                                                                  • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0064AB79,00000000,00000000), ref: 00666C98
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00666CC7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long$MessageSendShow
                                                                  • String ID: h\
                                                                  • API String ID: 3688381893-2592641360
                                                                  • Opcode ID: e1dd12fb7c0fd102e8e6c196118750fc66536d9265fc274fbe5b547af298bec9
                                                                  • Instruction ID: c06cd98c614292af5253cf916d3ef9f74262638e7629fb3ddbbaed3783f9b74b
                                                                  • Opcode Fuzzy Hash: e1dd12fb7c0fd102e8e6c196118750fc66536d9265fc274fbe5b547af298bec9
                                                                  • Instruction Fuzzy Hash: 3041B435604504AFDB24DF28DC58FFA7FAAEB0A360F150269F895A73E0C371AD51CA90
                                                                  APIs
                                                                    • Part of subcall function 0065304E: inet_addr.WSOCK32(?), ref: 0065307A
                                                                    • Part of subcall function 0065304E: _wcslen.LIBCMT ref: 0065309B
                                                                  • socket.WSOCK32(00000002,00000001,00000006), ref: 00651112
                                                                  • WSAGetLastError.WSOCK32 ref: 00651121
                                                                  • WSAGetLastError.WSOCK32 ref: 006511C9
                                                                  • closesocket.WSOCK32(00000000), ref: 006511F9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                  • String ID:
                                                                  • API String ID: 2675159561-0
                                                                  • Opcode ID: 3ee3f0821d4aa422fcc167a86a03ad970e025b26fb48c1ee892f8cf9521627c9
                                                                  • Instruction ID: b96ae978a3731c92d57ccd551218f53b11690bb495e791fbe499184517b3aea6
                                                                  • Opcode Fuzzy Hash: 3ee3f0821d4aa422fcc167a86a03ad970e025b26fb48c1ee892f8cf9521627c9
                                                                  • Instruction Fuzzy Hash: 1A41E231200A05AFDB209F24C884BE9BBAAFF85325F14809AFD459F391C774AD45CBA0
                                                                  APIs
                                                                    • Part of subcall function 0063DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0063CF22,?), ref: 0063DDFD
                                                                    • Part of subcall function 0063DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0063CF22,?), ref: 0063DE16
                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0063CF45
                                                                  • MoveFileW.KERNEL32(?,?), ref: 0063CF7F
                                                                  • _wcslen.LIBCMT ref: 0063D005
                                                                  • _wcslen.LIBCMT ref: 0063D01B
                                                                  • SHFileOperationW.SHELL32(?), ref: 0063D061
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                  • String ID: \*.*
                                                                  • API String ID: 3164238972-1173974218
                                                                  • Opcode ID: 37f0f2e9140774e6074d4abb969064538b018d9b944359ab329cb0cd39e175bd
                                                                  • Instruction ID: 170ae0a93c41b8ba0ff475ccd7b71f069a6652e05524a1bb57bd4d0a6c18da5e
                                                                  • Opcode Fuzzy Hash: 37f0f2e9140774e6074d4abb969064538b018d9b944359ab329cb0cd39e175bd
                                                                  • Instruction Fuzzy Hash: 0F415775D452195FDF12EFA4D985AEEB7BAAF44340F0000EAE505EB241EB34A685CF90
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00637769
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0063778F
                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00637792
                                                                  • SysAllocString.OLEAUT32(?), ref: 006377B0
                                                                  • SysFreeString.OLEAUT32(?), ref: 006377B9
                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 006377DE
                                                                  • SysAllocString.OLEAUT32(?), ref: 006377EC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                  • String ID:
                                                                  • API String ID: 3761583154-0
                                                                  • Opcode ID: 416317a1335c06bc9b785ce2113ca5de63e4c74cc19d80e4c72195a6f76362d3
                                                                  • Instruction ID: 3609eac1b4b0ed9e08d80d7cd02bffb316af1f769f601687c37c6bd7dce0b47f
                                                                  • Opcode Fuzzy Hash: 416317a1335c06bc9b785ce2113ca5de63e4c74cc19d80e4c72195a6f76362d3
                                                                  • Instruction Fuzzy Hash: 522192B6608619AFDB20DFA9CC88CFB77EEEB09764B048025F955DB250DA70DC41C7A0
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00637842
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00637868
                                                                  • SysAllocString.OLEAUT32(00000000), ref: 0063786B
                                                                  • SysAllocString.OLEAUT32 ref: 0063788C
                                                                  • SysFreeString.OLEAUT32 ref: 00637895
                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 006378AF
                                                                  • SysAllocString.OLEAUT32(?), ref: 006378BD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                  • String ID:
                                                                  • API String ID: 3761583154-0
                                                                  • Opcode ID: e2cb4d59d9dc57a316e4da9c54d576342d7b4a5a7a9ee1546d1996ab29d56a87
                                                                  • Instruction ID: 7fef09dd6ef4e9b0ebfe89e453f3c8ee4e0ebe390914db6a3561256f9a619208
                                                                  • Opcode Fuzzy Hash: e2cb4d59d9dc57a316e4da9c54d576342d7b4a5a7a9ee1546d1996ab29d56a87
                                                                  • Instruction Fuzzy Hash: E021A171608605AFDB209FA9DC8CDBA77EDEB09360B108135F955DB2A1DA70EC41CBA4
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 006404F2
                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0064052E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateHandlePipe
                                                                  • String ID: nul
                                                                  • API String ID: 1424370930-2873401336
                                                                  • Opcode ID: 5af24e4926f43861b8bd3301fa40e19e6e2d3279819094787c14456840e4f69d
                                                                  • Instruction ID: e04efa2128c2032bc3d1a05d1f263f650753f118878d02ca2c5c393369d9e272
                                                                  • Opcode Fuzzy Hash: 5af24e4926f43861b8bd3301fa40e19e6e2d3279819094787c14456840e4f69d
                                                                  • Instruction Fuzzy Hash: 7F217475500315DFEF249F29DD44A9A7BB6EF45724F204A19F9A1D72E0D7709940CF20
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 006405C6
                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00640601
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateHandlePipe
                                                                  • String ID: nul
                                                                  • API String ID: 1424370930-2873401336
                                                                  • Opcode ID: 63fe67f39758443406763b58b756d1b4ff1ffad03f4f87469c53735482f83915
                                                                  • Instruction ID: 83c116931461905c17f8076d07d72e208536a70155cb1d246d2b87074db86764
                                                                  • Opcode Fuzzy Hash: 63fe67f39758443406763b58b756d1b4ff1ffad03f4f87469c53735482f83915
                                                                  • Instruction Fuzzy Hash: 402197755003259BEB209F69CC04A9A77EABF95730F214A1DFEA2E73D0D7B09951CB10
                                                                  APIs
                                                                    • Part of subcall function 005D600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 005D604C
                                                                    • Part of subcall function 005D600E: GetStockObject.GDI32(00000011), ref: 005D6060
                                                                    • Part of subcall function 005D600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 005D606A
                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00664112
                                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0066411F
                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0066412A
                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00664139
                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00664145
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                                  • String ID: Msctls_Progress32
                                                                  • API String ID: 1025951953-3636473452
                                                                  • Opcode ID: 4f76691034b8dffd1f9910b86d403f20d6c31d8cb0c8bd8f366551886ef3a8f0
                                                                  • Instruction ID: 1d53ac64e09bfd8a871272263e365bc18d40372202dc3001e166a5fd5848e1ec
                                                                  • Opcode Fuzzy Hash: 4f76691034b8dffd1f9910b86d403f20d6c31d8cb0c8bd8f366551886ef3a8f0
                                                                  • Instruction Fuzzy Hash: E611E2B214021ABEEF109F64CC85EE77F6EEF093A8F004111FB18A2150CA729C61DBA4
                                                                  APIs
                                                                    • Part of subcall function 0060D7A3: _free.LIBCMT ref: 0060D7CC
                                                                  • _free.LIBCMT ref: 0060D82D
                                                                    • Part of subcall function 006029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000), ref: 006029DE
                                                                    • Part of subcall function 006029C8: GetLastError.KERNEL32(00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000,00000000), ref: 006029F0
                                                                  • _free.LIBCMT ref: 0060D838
                                                                  • _free.LIBCMT ref: 0060D843
                                                                  • _free.LIBCMT ref: 0060D897
                                                                  • _free.LIBCMT ref: 0060D8A2
                                                                  • _free.LIBCMT ref: 0060D8AD
                                                                  • _free.LIBCMT ref: 0060D8B8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                  • Instruction ID: bf27d3cbd510fc234f9994b3cced58e768c10a32bcf6446aed7618c98acfa097
                                                                  • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                  • Instruction Fuzzy Hash: 64117C715C0B04AAD6A5BFF0CC0BFCB7BDEAF40B00F400D2DB299A60D2DA24F5058664
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0063DA74
                                                                  • LoadStringW.USER32(00000000), ref: 0063DA7B
                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0063DA91
                                                                  • LoadStringW.USER32(00000000), ref: 0063DA98
                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0063DADC
                                                                  Strings
                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 0063DAB9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: HandleLoadModuleString$Message
                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                  • API String ID: 4072794657-3128320259
                                                                  • Opcode ID: bf33f5f70902ecd5535666be63bbea8909d3a31e95eec132eb31a5c00435eea2
                                                                  • Instruction ID: 484ec9bd4489a6691f71381fe4b35005236d3f33a14996bfcdeb9c25d6d64121
                                                                  • Opcode Fuzzy Hash: bf33f5f70902ecd5535666be63bbea8909d3a31e95eec132eb31a5c00435eea2
                                                                  • Instruction Fuzzy Hash: 960186F29002087FE7109BA4DD89EF7776DEB08711F405496F746E2141E6B49E844FB4
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32(00E1E9D0,00E1E9D0), ref: 0064097B
                                                                  • EnterCriticalSection.KERNEL32(00E1E9B0,00000000), ref: 0064098D
                                                                  • TerminateThread.KERNEL32(00E1A268,000001F6), ref: 0064099B
                                                                  • WaitForSingleObject.KERNEL32(00E1A268,000003E8), ref: 006409A9
                                                                  • CloseHandle.KERNEL32(00E1A268), ref: 006409B8
                                                                  • InterlockedExchange.KERNEL32(00E1E9D0,000001F6), ref: 006409C8
                                                                  • LeaveCriticalSection.KERNEL32(00E1E9B0), ref: 006409CF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                  • String ID:
                                                                  • API String ID: 3495660284-0
                                                                  • Opcode ID: 497ad5f7bddf3a3a0d8e786f9a9853f717a71ee28fec9b1868fcab2ec373029b
                                                                  • Instruction ID: 4973f09f1d9045aaadd52d7c2e3e4aad88ef2507802fdf21625e10aee5af7b5a
                                                                  • Opcode Fuzzy Hash: 497ad5f7bddf3a3a0d8e786f9a9853f717a71ee28fec9b1868fcab2ec373029b
                                                                  • Instruction Fuzzy Hash: 9DF03131442D12BBE7415FA5EE9CBE6BB3AFF01712F403015F241508A0C7B5A565DFA0
                                                                  APIs
                                                                  • _free.LIBCMT ref: 006022BE
                                                                    • Part of subcall function 006029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000), ref: 006029DE
                                                                    • Part of subcall function 006029C8: GetLastError.KERNEL32(00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000,00000000), ref: 006029F0
                                                                  • _free.LIBCMT ref: 006022D0
                                                                  • _free.LIBCMT ref: 006022E3
                                                                  • _free.LIBCMT ref: 006022F4
                                                                  • _free.LIBCMT ref: 00602305
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID: H
                                                                  • API String ID: 776569668-69643886
                                                                  • Opcode ID: 5cb6df4e494ee653b26aeb48f7dca00c07ba00b8137d955c845033c299fab7ec
                                                                  • Instruction ID: a85780b849411a168e9204d63e1f53a4b9656e4efb63f4ac64eefae43dbf628e
                                                                  • Opcode Fuzzy Hash: 5cb6df4e494ee653b26aeb48f7dca00c07ba00b8137d955c845033c299fab7ec
                                                                  • Instruction Fuzzy Hash: AAF030744901118FCB56BF65BC1595A3F6BBF1BB60B50290BF410D72F1C7306A519FA8
                                                                  APIs
                                                                  • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00651DC0
                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00651DE1
                                                                  • WSAGetLastError.WSOCK32 ref: 00651DF2
                                                                  • htons.WSOCK32(?), ref: 00651EDB
                                                                  • inet_ntoa.WSOCK32(?), ref: 00651E8C
                                                                    • Part of subcall function 006339E8: _strlen.LIBCMT ref: 006339F2
                                                                    • Part of subcall function 00653224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0064EC0C), ref: 00653240
                                                                  • _strlen.LIBCMT ref: 00651F35
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                  • String ID:
                                                                  • API String ID: 3203458085-0
                                                                  • Opcode ID: b62e1e283d26eb7c87131681a2ffeb5ea847b14a2cd179dfd246b3dba61c6948
                                                                  • Instruction ID: 2206a73e478aa115bd7841e7721e27dacefba9143b6f053a0bc0de4c9d0f830a
                                                                  • Opcode Fuzzy Hash: b62e1e283d26eb7c87131681a2ffeb5ea847b14a2cd179dfd246b3dba61c6948
                                                                  • Instruction Fuzzy Hash: D4B1BA30204341AFC324DB24C885F6A7BE6AF85318F54894DF8564F3A2DB71ED46CB91
                                                                  APIs
                                                                  • __allrem.LIBCMT ref: 006000BA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006000D6
                                                                  • __allrem.LIBCMT ref: 006000ED
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0060010B
                                                                  • __allrem.LIBCMT ref: 00600122
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00600140
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                  • String ID:
                                                                  • API String ID: 1992179935-0
                                                                  • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                  • Instruction ID: 75884bab3b8c0e8edf4ec04036ed9f4b2f71239090f7065925f4a2141c12f4ba
                                                                  • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                  • Instruction Fuzzy Hash: DB813772A40B069FE7289F68CC41BAB77EAAF41324F24453EF611D76C1E774D9408B94
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005F82D9,005F82D9,?,?,?,0060644F,00000001,00000001,8BE85006), ref: 00606258
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0060644F,00000001,00000001,8BE85006,?,?,?), ref: 006062DE
                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 006063D8
                                                                  • __freea.LIBCMT ref: 006063E5
                                                                    • Part of subcall function 00603820: RtlAllocateHeap.NTDLL(00000000,?,006A1444,?,005EFDF5,?,?,005DA976,00000010,006A1440,005D13FC,?,005D13C6,?,005D1129), ref: 00603852
                                                                  • __freea.LIBCMT ref: 006063EE
                                                                  • __freea.LIBCMT ref: 00606413
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1414292761-0
                                                                  • Opcode ID: 21d3b4a9e16cebaeb8eedf801d85fff8d9a64886020311cb7ef4e77e57a8ef20
                                                                  • Instruction ID: 6d2943e95dfc5038bc7e044ba294043cd2c4d1d3a3885e5c0ad3ae736adde8fe
                                                                  • Opcode Fuzzy Hash: 21d3b4a9e16cebaeb8eedf801d85fff8d9a64886020311cb7ef4e77e57a8ef20
                                                                  • Instruction Fuzzy Hash: FF51B072640216ABDB2D8F64CC81EEF77ABEF44750F144629F805DA2C0EB34DD61C6A0
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                    • Part of subcall function 0065C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0065B6AE,?,?), ref: 0065C9B5
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065C9F1
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065CA68
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065CA9E
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0065BCCA
                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0065BD25
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0065BD6A
                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0065BD99
                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0065BDF3
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0065BDFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                  • String ID:
                                                                  • API String ID: 1120388591-0
                                                                  • Opcode ID: 90c4ddbb150a9553e082817ad5471e0a446dbfd97748f6b92d34510e647d10d6
                                                                  • Instruction ID: 90717f580070b5087ecc495569b5793ab5a77f6dd27b7b05b68a0a3dcbd5b646
                                                                  • Opcode Fuzzy Hash: 90c4ddbb150a9553e082817ad5471e0a446dbfd97748f6b92d34510e647d10d6
                                                                  • Instruction Fuzzy Hash: BA818E30208241AFD714DF24C895E6ABBF6FF84348F14955DF8954B2A2DB32ED49CB92
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(00000035), ref: 0062F7B9
                                                                  • SysAllocString.OLEAUT32(00000001), ref: 0062F860
                                                                  • VariantCopy.OLEAUT32(0062FA64,00000000), ref: 0062F889
                                                                  • VariantClear.OLEAUT32(0062FA64), ref: 0062F8AD
                                                                  • VariantCopy.OLEAUT32(0062FA64,00000000), ref: 0062F8B1
                                                                  • VariantClear.OLEAUT32(?), ref: 0062F8BB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearCopy$AllocInitString
                                                                  • String ID:
                                                                  • API String ID: 3859894641-0
                                                                  • Opcode ID: 0e9906f968bba224a4046f2873d54c5976a5867c3abbe31affabb5ac6c6621f9
                                                                  • Instruction ID: 7bb365b6bc5c4d5e3b1e8e223da07e336485de1b475d1c2ed98d94b2afc7e056
                                                                  • Opcode Fuzzy Hash: 0e9906f968bba224a4046f2873d54c5976a5867c3abbe31affabb5ac6c6621f9
                                                                  • Instruction Fuzzy Hash: 1E51D431A00721BADF24AB65E895B29B7F6EF45310B20947BE805DF291DB708C81CF97
                                                                  APIs
                                                                    • Part of subcall function 005D7620: _wcslen.LIBCMT ref: 005D7625
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                  • GetOpenFileNameW.COMDLG32(00000058), ref: 006494E5
                                                                  • _wcslen.LIBCMT ref: 00649506
                                                                  • _wcslen.LIBCMT ref: 0064952D
                                                                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00649585
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$FileName$OpenSave
                                                                  • String ID: X
                                                                  • API String ID: 83654149-3081909835
                                                                  • Opcode ID: 32bbb105a884495a976c9c9797e84644ffe7662cf32dec96310f87e7a11d2e75
                                                                  • Instruction ID: c637af5dc139c5800561f8cd8a86c7c30feebbb1cbbe201fbd6070cdfbbe775d
                                                                  • Opcode Fuzzy Hash: 32bbb105a884495a976c9c9797e84644ffe7662cf32dec96310f87e7a11d2e75
                                                                  • Instruction Fuzzy Hash: 31E160316043419FD724DF24C485A6BBBE5BFC5314F14896EE8899B3A2EB31DD05CBA2
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  • BeginPaint.USER32(?,?,?), ref: 005E9241
                                                                  • GetWindowRect.USER32(?,?), ref: 005E92A5
                                                                  • ScreenToClient.USER32(?,?), ref: 005E92C2
                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005E92D3
                                                                  • EndPaint.USER32(?,?,?,?,?), ref: 005E9321
                                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 006271EA
                                                                    • Part of subcall function 005E9339: BeginPath.GDI32(00000000), ref: 005E9357
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                  • String ID:
                                                                  • API String ID: 3050599898-0
                                                                  • Opcode ID: 68cdb164c9f83ba8dbf1b83840145f7f4d40fa02a924c9085a8e98052bbdbaf6
                                                                  • Instruction ID: ccdd1c802e7a99467236d6d3355f9912ba173fbb59ab3c15e8265231a3e1d0a1
                                                                  • Opcode Fuzzy Hash: 68cdb164c9f83ba8dbf1b83840145f7f4d40fa02a924c9085a8e98052bbdbaf6
                                                                  • Instruction Fuzzy Hash: 5C41A170104651AFD711DF25D888FBB7BAAFF4A320F140629F9A48B2E1C7719845DB62
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 0064080C
                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00640847
                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00640863
                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 006408DC
                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 006408F3
                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00640921
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                  • String ID:
                                                                  • API String ID: 3368777196-0
                                                                  • Opcode ID: 8a7ffca4342d903700c7e74ab3603ce4e56707328c225236c3c52b54ef115f04
                                                                  • Instruction ID: 6df339346e293e0c8aeef1eec79c714b72b66a29d8b8ea8b10907594a653c0b1
                                                                  • Opcode Fuzzy Hash: 8a7ffca4342d903700c7e74ab3603ce4e56707328c225236c3c52b54ef115f04
                                                                  • Instruction Fuzzy Hash: 1F417E71900205EFEF149F55DC85AAA7B7AFF44310F1440A5EE009E297DB70EE60DBA0
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 00634C95
                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00634CB2
                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00634CEA
                                                                  • _wcslen.LIBCMT ref: 00634D08
                                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00634D10
                                                                  • _wcsstr.LIBVCRUNTIME ref: 00634D1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                  • String ID:
                                                                  • API String ID: 72514467-0
                                                                  • Opcode ID: 360899af401eaf0cfc164e93ffc95cff4786078e213e0af0db31fa1ee78ead82
                                                                  • Instruction ID: 5833e26f9e1cd936dd1ad0120a19210ec5c99c8db774520a34d3e7bfb2b56c7d
                                                                  • Opcode Fuzzy Hash: 360899af401eaf0cfc164e93ffc95cff4786078e213e0af0db31fa1ee78ead82
                                                                  • Instruction Fuzzy Hash: 0A210B716042457BEB155B35EC49E7BBF9EDF45760F108039F805CA291DEA1EC0197E0
                                                                  APIs
                                                                    • Part of subcall function 005D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005D3A97,?,?,005D2E7F,?,?,?,00000000), ref: 005D3AC2
                                                                  • _wcslen.LIBCMT ref: 0064587B
                                                                  • CoInitialize.OLE32(00000000), ref: 00645995
                                                                  • CoCreateInstance.OLE32(0066FCF8,00000000,00000001,0066FB68,?), ref: 006459AE
                                                                  • CoUninitialize.OLE32 ref: 006459CC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                  • String ID: .lnk
                                                                  • API String ID: 3172280962-24824748
                                                                  • Opcode ID: 3d7f44bd1a15d9c478956d67f9c3d925c943177416785e8b5b5b75493df2dd41
                                                                  • Instruction ID: 9868eee92c850c22dde38ac825a6e70be58184f85113fe46a04434c14769e53b
                                                                  • Opcode Fuzzy Hash: 3d7f44bd1a15d9c478956d67f9c3d925c943177416785e8b5b5b75493df2dd41
                                                                  • Instruction Fuzzy Hash: 19D144716087029FC714DF18C49496ABBE6FF89710F14895EF88A9B362DB31EC45CB92
                                                                  APIs
                                                                    • Part of subcall function 00630FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00630FCA
                                                                    • Part of subcall function 00630FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00630FD6
                                                                    • Part of subcall function 00630FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00630FE5
                                                                    • Part of subcall function 00630FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00630FEC
                                                                    • Part of subcall function 00630FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00631002
                                                                  • GetLengthSid.ADVAPI32(?,00000000,00631335), ref: 006317AE
                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006317BA
                                                                  • HeapAlloc.KERNEL32(00000000), ref: 006317C1
                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 006317DA
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00631335), ref: 006317EE
                                                                  • HeapFree.KERNEL32(00000000), ref: 006317F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                  • String ID:
                                                                  • API String ID: 3008561057-0
                                                                  • Opcode ID: 4cdc51e99e0b42724650c36ff13ddc73b7de70071786c1a83f12facb9d5e0a48
                                                                  • Instruction ID: 7160b8d89f6d4ba17aeacc6f1e695f3c2a8be3da307e299e663d51db56f75380
                                                                  • Opcode Fuzzy Hash: 4cdc51e99e0b42724650c36ff13ddc73b7de70071786c1a83f12facb9d5e0a48
                                                                  • Instruction Fuzzy Hash: DA118E31500605FFDB209FA4CC49BFEBBBAEB46365F185018F4819B210D776AA44DBB0
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006314FF
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00631506
                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00631515
                                                                  • CloseHandle.KERNEL32(00000004), ref: 00631520
                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0063154F
                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00631563
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                  • String ID:
                                                                  • API String ID: 1413079979-0
                                                                  • Opcode ID: f84822a28050ca4c807d3a60bd2dd25fcb770817b2eecd91094e4aa4c271f558
                                                                  • Instruction ID: d8cbfc86c92fb98c4d167caf003573862625f480c056da195baf996cbc265de1
                                                                  • Opcode Fuzzy Hash: f84822a28050ca4c807d3a60bd2dd25fcb770817b2eecd91094e4aa4c271f558
                                                                  • Instruction Fuzzy Hash: B611597250020DABDF11CF99DD49FEE7BAAEF49754F045015FA05A6160C3B28E61DBA0
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,005F3379,005F2FE5), ref: 005F3390
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005F339E
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005F33B7
                                                                  • SetLastError.KERNEL32(00000000,?,005F3379,005F2FE5), ref: 005F3409
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: 1c2c5ee6eaf10b630289b09145bf087d97239fb660e2efaecbd3647658247ce1
                                                                  • Instruction ID: 7e5ce1e1333e9dda63220e6135a432385d4013021dffca34559284ee39dddb89
                                                                  • Opcode Fuzzy Hash: 1c2c5ee6eaf10b630289b09145bf087d97239fb660e2efaecbd3647658247ce1
                                                                  • Instruction Fuzzy Hash: 3F01243320831ABEFB253B747C9DA372E99FB45379B20062AF710812F0EF5A4D129544
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,00605686,00613CD6,?,00000000,?,00605B6A,?,?,?,?,?,005FE6D1,?,00698A48), ref: 00602D78
                                                                  • _free.LIBCMT ref: 00602DAB
                                                                  • _free.LIBCMT ref: 00602DD3
                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,005FE6D1,?,00698A48,00000010,005D4F4A,?,?,00000000,00613CD6), ref: 00602DE0
                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,005FE6D1,?,00698A48,00000010,005D4F4A,?,?,00000000,00613CD6), ref: 00602DEC
                                                                  • _abort.LIBCMT ref: 00602DF2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free$_abort
                                                                  • String ID:
                                                                  • API String ID: 3160817290-0
                                                                  • Opcode ID: 50ca94614eb54eee734dd28adaaec77e4e7016253e4d6fa79871b4b07b2c831a
                                                                  • Instruction ID: 4287210a165e0f2145913a9b1312458badbdadb4af0f86d4415fd175c56a0bb7
                                                                  • Opcode Fuzzy Hash: 50ca94614eb54eee734dd28adaaec77e4e7016253e4d6fa79871b4b07b2c831a
                                                                  • Instruction Fuzzy Hash: A9F0F9315C490267C75A37396C2EA5B265FAFC1775B21041DF424923D2EE209C015124
                                                                  APIs
                                                                    • Part of subcall function 005E9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005E9693
                                                                    • Part of subcall function 005E9639: SelectObject.GDI32(?,00000000), ref: 005E96A2
                                                                    • Part of subcall function 005E9639: BeginPath.GDI32(?), ref: 005E96B9
                                                                    • Part of subcall function 005E9639: SelectObject.GDI32(?,00000000), ref: 005E96E2
                                                                  • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00668A4E
                                                                  • LineTo.GDI32(?,00000003,00000000), ref: 00668A62
                                                                  • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00668A70
                                                                  • LineTo.GDI32(?,00000000,00000003), ref: 00668A80
                                                                  • EndPath.GDI32(?), ref: 00668A90
                                                                  • StrokePath.GDI32(?), ref: 00668AA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                  • String ID:
                                                                  • API String ID: 43455801-0
                                                                  • Opcode ID: bdf2a59db21572abf3f5059dea653c1e9c2b8f8d619fe83c7ec9a2e104be0085
                                                                  • Instruction ID: e980d065ddff0869e5fac97efccf76b94fc4620d73ac69acbe524ffe4de40518
                                                                  • Opcode Fuzzy Hash: bdf2a59db21572abf3f5059dea653c1e9c2b8f8d619fe83c7ec9a2e104be0085
                                                                  • Instruction Fuzzy Hash: 7511CC7600014DFFDF119F94DC48EAA7F6EEB09364F048012FA559A161C7729D55DFA0
                                                                  APIs
                                                                  • GetDC.USER32(00000000), ref: 00635218
                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00635229
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00635230
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00635238
                                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0063524F
                                                                  • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00635261
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDevice$Release
                                                                  • String ID:
                                                                  • API String ID: 1035833867-0
                                                                  • Opcode ID: c045e1283cdf79bc20f5b00602b54c727243351bc9bc88674fb179c4ad24f248
                                                                  • Instruction ID: c4a10ce048ac044b2cc8eeef71bd79511d965ebc5b9516b418c403ec1cdf730c
                                                                  • Opcode Fuzzy Hash: c045e1283cdf79bc20f5b00602b54c727243351bc9bc88674fb179c4ad24f248
                                                                  • Instruction Fuzzy Hash: 5201A275E00B18BBEB109BA59C49E5EBFB9EF48361F045066FA05E7380D6B09D00CFA0
                                                                  APIs
                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 005D1BF4
                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 005D1BFC
                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 005D1C07
                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 005D1C12
                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 005D1C1A
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 005D1C22
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual
                                                                  • String ID:
                                                                  • API String ID: 4278518827-0
                                                                  • Opcode ID: d188df23f8f2e2e872af121034a701e529bc129031237d79674b9023a4fc0855
                                                                  • Instruction ID: 2093f156cbcdc0ce0d441b1af84640ddbbb0b8e4f79e6d327769b8c9887c8454
                                                                  • Opcode Fuzzy Hash: d188df23f8f2e2e872af121034a701e529bc129031237d79674b9023a4fc0855
                                                                  • Instruction Fuzzy Hash: EA0148B0902B5A7DE3008F5A8C85A52FEA8FF19354F00411B915C47941C7F5A864CBE5
                                                                  APIs
                                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0063EB30
                                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0063EB46
                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 0063EB55
                                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0063EB64
                                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0063EB6E
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0063EB75
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                  • String ID:
                                                                  • API String ID: 839392675-0
                                                                  • Opcode ID: e7bcbe69185a566a3f73ca3275f6e2022f952a1d50c6319d53c1b83b078a41eb
                                                                  • Instruction ID: 987a3475941e45ba2ef043b20b84c67c68b0fda048ed26801c83befc66f0ffa4
                                                                  • Opcode Fuzzy Hash: e7bcbe69185a566a3f73ca3275f6e2022f952a1d50c6319d53c1b83b078a41eb
                                                                  • Instruction Fuzzy Hash: C2F01772240958BBE7216B63DC0EEFB7A7DEFCAB21F001158F642E119196E05A0186B9
                                                                  APIs
                                                                  • GetClientRect.USER32(?), ref: 00627452
                                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00627469
                                                                  • GetWindowDC.USER32(?), ref: 00627475
                                                                  • GetPixel.GDI32(00000000,?,?), ref: 00627484
                                                                  • ReleaseDC.USER32(?,00000000), ref: 00627496
                                                                  • GetSysColor.USER32(00000005), ref: 006274B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                  • String ID:
                                                                  • API String ID: 272304278-0
                                                                  • Opcode ID: 69031397ce57590d8598274237325a5018da82fe8151833d27034c64d796ad41
                                                                  • Instruction ID: 590ef8989ec7e4510aa886c4d25fec957174f811d8bad66391f0e2eef47353d9
                                                                  • Opcode Fuzzy Hash: 69031397ce57590d8598274237325a5018da82fe8151833d27034c64d796ad41
                                                                  • Instruction Fuzzy Hash: 7C018B31400A15EFDB106FA4EC08BFE7BB7FB04321F106060F956A21A0CB712E51AF51
                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0063187F
                                                                  • UnloadUserProfile.USERENV(?,?), ref: 0063188B
                                                                  • CloseHandle.KERNEL32(?), ref: 00631894
                                                                  • CloseHandle.KERNEL32(?), ref: 0063189C
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 006318A5
                                                                  • HeapFree.KERNEL32(00000000), ref: 006318AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                  • String ID:
                                                                  • API String ID: 146765662-0
                                                                  • Opcode ID: 8a5e4134cfad87f21309990825cf4c9edbc1241611e20ea6a3c659b707a722a0
                                                                  • Instruction ID: f61825a08f09d88ecb7019be31fc881faeebdf931320e37efa38cd8c3fd4e12d
                                                                  • Opcode Fuzzy Hash: 8a5e4134cfad87f21309990825cf4c9edbc1241611e20ea6a3c659b707a722a0
                                                                  • Instruction Fuzzy Hash: 89E0C936004901BBDB016BA3ED0C915FF2AFB4A7327109221F26591170CBB26420DB60
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 005DBEB3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Init_thread_footer
                                                                  • String ID: D%j$D%j$D%j$D%jD%j
                                                                  • API String ID: 1385522511-528900389
                                                                  • Opcode ID: 637d596d62a2451f4b5496fdac43cf5b23189fd5cb93438537ee70192ea54dfc
                                                                  • Instruction ID: 69a5d6cf529ae3bd485d22c71cf7926fc7b30085faf162ab29ff1b04e04fa43e
                                                                  • Opcode Fuzzy Hash: 637d596d62a2451f4b5496fdac43cf5b23189fd5cb93438537ee70192ea54dfc
                                                                  • Instruction Fuzzy Hash: 92911775A0020ACFDB28DF5DC0906A9BBF3FF59310B26456BD945AB351E731AD81CB90
                                                                  APIs
                                                                    • Part of subcall function 005F0242: EnterCriticalSection.KERNEL32(006A070C,006A1884,?,?,005E198B,006A2518,?,?,?,005D12F9,00000000), ref: 005F024D
                                                                    • Part of subcall function 005F0242: LeaveCriticalSection.KERNEL32(006A070C,?,005E198B,006A2518,?,?,?,005D12F9,00000000), ref: 005F028A
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                    • Part of subcall function 005F00A3: __onexit.LIBCMT ref: 005F00A9
                                                                  • __Init_thread_footer.LIBCMT ref: 00657BFB
                                                                    • Part of subcall function 005F01F8: EnterCriticalSection.KERNEL32(006A070C,?,?,005E8747,006A2514), ref: 005F0202
                                                                    • Part of subcall function 005F01F8: LeaveCriticalSection.KERNEL32(006A070C,?,005E8747,006A2514), ref: 005F0235
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                  • String ID: +Tb$5$G$Variable must be of type 'Object'.
                                                                  • API String ID: 535116098-488681553
                                                                  • Opcode ID: e89bda0b87592b0cb123b348fe04cbd7cc3b27529eb400f6433334230d83ec40
                                                                  • Instruction ID: aa168381c03c60cb0d985ebdc6af8bba65b7f077f53f593f347e8de908b2812c
                                                                  • Opcode Fuzzy Hash: e89bda0b87592b0cb123b348fe04cbd7cc3b27529eb400f6433334230d83ec40
                                                                  • Instruction Fuzzy Hash: BA918C70A04209AFCB14EF58E8959BDBBB2FF45301F14815AFC469B392DB31AE49CB51
                                                                  APIs
                                                                    • Part of subcall function 005D7620: _wcslen.LIBCMT ref: 005D7625
                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0063C6EE
                                                                  • _wcslen.LIBCMT ref: 0063C735
                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0063C79C
                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0063C7CA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMenu$Info_wcslen$Default
                                                                  • String ID: 0
                                                                  • API String ID: 1227352736-4108050209
                                                                  • Opcode ID: 0b7a72611c60fd397cf2d801bf6d9c91dfe24d1e945da1a8eb09371795f78663
                                                                  • Instruction ID: 7b11a5e892e8b8189a66e676545004fe4ff6cbe4493d41e64a457122862f1ef9
                                                                  • Opcode Fuzzy Hash: 0b7a72611c60fd397cf2d801bf6d9c91dfe24d1e945da1a8eb09371795f78663
                                                                  • Instruction Fuzzy Hash: B251B3716043419BD7149F28C849BAB7BEAAF8A324F04092DF995F72A1DB70DD04CF92
                                                                  APIs
                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 0065AEA3
                                                                    • Part of subcall function 005D7620: _wcslen.LIBCMT ref: 005D7625
                                                                  • GetProcessId.KERNEL32(00000000), ref: 0065AF38
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0065AF67
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                  • String ID: <$@
                                                                  • API String ID: 146682121-1426351568
                                                                  • Opcode ID: 36f330c334cce992238cbcbced587f8d6de2063e2bd1831394c31a7ea0bdef60
                                                                  • Instruction ID: 4ab3708f8091e626381e0fe7b866976f782af359715d120c7db90fdc304d7039
                                                                  • Opcode Fuzzy Hash: 36f330c334cce992238cbcbced587f8d6de2063e2bd1831394c31a7ea0bdef60
                                                                  • Instruction Fuzzy Hash: CB71AD70A0021ACFCB14DF98D485A9EBBF1FF48310F04859AE856AB362D770ED45CB91
                                                                  APIs
                                                                  • GetWindowRect.USER32(00E2EC08,?), ref: 006662E2
                                                                  • ScreenToClient.USER32(?,?), ref: 00666315
                                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00666382
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientMoveRectScreen
                                                                  • String ID: h\
                                                                  • API String ID: 3880355969-2592641360
                                                                  • Opcode ID: 4a04a9633751a2808054807c2b607d15d3f0fb15fe51f7561e8e1c4a89bca591
                                                                  • Instruction ID: 1826d1b682411900899bd9151f786c0615b5b549c1f7895bdb83e438c34c2673
                                                                  • Opcode Fuzzy Hash: 4a04a9633751a2808054807c2b607d15d3f0fb15fe51f7561e8e1c4a89bca591
                                                                  • Instruction Fuzzy Hash: 37510A74A00249EFDB10DF58E8809AE7BB6EF85364F10915AF855AB390D770AD81CB90
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00637206
                                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0063723C
                                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0063724D
                                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006372CF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                                  • String ID: DllGetClassObject
                                                                  • API String ID: 753597075-1075368562
                                                                  • Opcode ID: 2e4bef65a2ab5111ef00406a8c8f80736308c823dbcdcc4dc4d9abaaa0a4efda
                                                                  • Instruction ID: 2f586b0a76aca5312e9778fe5b2aab64a409e1b2554d97ee410ebf7314a8aafa
                                                                  • Opcode Fuzzy Hash: 2e4bef65a2ab5111ef00406a8c8f80736308c823dbcdcc4dc4d9abaaa0a4efda
                                                                  • Instruction Fuzzy Hash: 354141B1A04605EFDB25CF54C884A9B7BAAEF45310F1580ADFD059F20AD7B1DA45CBE0
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00665352
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00665375
                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00665382
                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006653A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$InvalidateMessageRectSend
                                                                  • String ID: h\
                                                                  • API String ID: 3340791633-2592641360
                                                                  • Opcode ID: 1bccff81583792652c89661212df047d01a9c19cf74646fca9d5df901c4e21b0
                                                                  • Instruction ID: 28e6335c8979a3ff6761347d878398f8d7a71f40e8e5805da7f7d7d308c63a08
                                                                  • Opcode Fuzzy Hash: 1bccff81583792652c89661212df047d01a9c19cf74646fca9d5df901c4e21b0
                                                                  • Instruction Fuzzy Hash: 9231B434A55A08EFEF309F14CC17BE93767AB05B90F545102FA52A63E1E7B0A9409B82
                                                                  APIs
                                                                  • ClientToScreen.USER32(?,?), ref: 0066769A
                                                                  • GetWindowRect.USER32(?,?), ref: 00667710
                                                                  • PtInRect.USER32(?,?,00668B89), ref: 00667720
                                                                  • MessageBeep.USER32(00000000), ref: 0066778C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                  • String ID: h\
                                                                  • API String ID: 1352109105-2592641360
                                                                  • Opcode ID: 6bd2a53278a7fb6c4c95f8c559d85f8f1f694be0087f16ffbe0a24027575d330
                                                                  • Instruction ID: 67f37bec90999187c50112ebb785a7dda750694bb5ec039d64a6506353523a3f
                                                                  • Opcode Fuzzy Hash: 6bd2a53278a7fb6c4c95f8c559d85f8f1f694be0087f16ffbe0a24027575d330
                                                                  • Instruction Fuzzy Hash: DE418D34605214EFDB01DF58D894EA9BBF6FB4A318F1980A9E415DF361D730A942CF90
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00664705
                                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00664713
                                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0066471A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$DestroyWindow
                                                                  • String ID: h\$msctls_updown32
                                                                  • API String ID: 4014797782-2486740465
                                                                  • Opcode ID: 95983865a3651246773ed67ba2315ac4b58e88ebb822482c2701c2fc09a7ef1f
                                                                  • Instruction ID: ac189be1f2de8611236c43111f3b2e1e63d0f38909651b5e1578e7408773a84a
                                                                  • Opcode Fuzzy Hash: 95983865a3651246773ed67ba2315ac4b58e88ebb822482c2701c2fc09a7ef1f
                                                                  • Instruction Fuzzy Hash: B22131B5600209AFDB10DF64DC95DB73BAEEB5B3A4B040159F6009B351DB71EC51CA60
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00662F8D
                                                                  • LoadLibraryW.KERNEL32(?), ref: 00662F94
                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00662FA9
                                                                  • DestroyWindow.USER32(?), ref: 00662FB1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                  • String ID: SysAnimate32
                                                                  • API String ID: 3529120543-1011021900
                                                                  • Opcode ID: f160767ccfa18ce314b8349344f4c32ed1cdada456cf5433d571034164b388d0
                                                                  • Instruction ID: 74e732dd7b6fea0754544e95c1c0f09693c7fbd487267474523f9e0525802f4e
                                                                  • Opcode Fuzzy Hash: f160767ccfa18ce314b8349344f4c32ed1cdada456cf5433d571034164b388d0
                                                                  • Instruction Fuzzy Hash: 3421F0B1240A06ABEF104FA4DCA0EBB37BEEF59364F104219F950D6290D7B1DC419760
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  • GetCursorPos.USER32(?), ref: 00669001
                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00627711,?,?,?,?,?), ref: 00669016
                                                                  • GetCursorPos.USER32(?), ref: 0066905E
                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00627711,?,?,?), ref: 00669094
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                  • String ID: h\
                                                                  • API String ID: 2864067406-2592641360
                                                                  • Opcode ID: 6c694971bf317519ef65c82f32d5537f461b7e546d10d8e25e1914216b8a48f0
                                                                  • Instruction ID: 8f37337941dacb4c8d0b31e89acf6c5bad0b3d4296a55de096bdbbe4a1c928c6
                                                                  • Opcode Fuzzy Hash: 6c694971bf317519ef65c82f32d5537f461b7e546d10d8e25e1914216b8a48f0
                                                                  • Instruction Fuzzy Hash: 6B219C35601018FFCF299F94CC58EFA7BBBEB8A360F144069F9458B261C371A990DB60
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,005F4D1E,006028E9,?,005F4CBE,006028E9,006988B8,0000000C,005F4E15,006028E9,00000002), ref: 005F4D8D
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005F4DA0
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,005F4D1E,006028E9,?,005F4CBE,006028E9,006988B8,0000000C,005F4E15,006028E9,00000002,00000000), ref: 005F4DC3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: 0247b5035893bc9082b1dc415441b9fd31287eb9700651c3642bc8e9706ea581
                                                                  • Instruction ID: bbd22735b5631576fcbea26af3e4d7a69969a60ba0bdf3851b03eccc01e382d4
                                                                  • Opcode Fuzzy Hash: 0247b5035893bc9082b1dc415441b9fd31287eb9700651c3642bc8e9706ea581
                                                                  • Instruction Fuzzy Hash: 8CF0AF30A0020CBBDB149F94DC09BBEBFBAEF44722F0000A9F909E2260CB745940CF90
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,005D4EDD,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4E9C
                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005D4EAE
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,005D4EDD,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4EC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeLoadProc
                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                  • API String ID: 145871493-3689287502
                                                                  • Opcode ID: b3c42348219ffd65059208f62835aeb9bee0d66b8a530c153bcf97857e7442a8
                                                                  • Instruction ID: 72284425e2ddc3c6536ac95d9e43e3a361feb02cd7dd646ddcf1677c8731421e
                                                                  • Opcode Fuzzy Hash: b3c42348219ffd65059208f62835aeb9bee0d66b8a530c153bcf97857e7442a8
                                                                  • Instruction Fuzzy Hash: 7DE08635A019226BD3311729AC18A7BAA5DFF82B7270A0117FC40D2300DBB0CD0544A1
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00613CDE,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4E62
                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005D4E74
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00613CDE,?,006A1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005D4E87
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeLoadProc
                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                  • API String ID: 145871493-1355242751
                                                                  • Opcode ID: db2a63f40f286d111ae02fb1eef10da7dd24847aa6b9a5dcdf99db1d76b6723e
                                                                  • Instruction ID: 2f1a99bb74f9a028b965f0d9ef2706a5c9ff2e83e78ed631ff8337f741123793
                                                                  • Opcode Fuzzy Hash: db2a63f40f286d111ae02fb1eef10da7dd24847aa6b9a5dcdf99db1d76b6723e
                                                                  • Instruction Fuzzy Hash: A4D01235502E7167DB321B29AC18DABAF1EFFC6B713060617F945A2214CFB0CD0189D2
                                                                  APIs
                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00642C05
                                                                  • DeleteFileW.KERNEL32(?), ref: 00642C87
                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00642C9D
                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00642CAE
                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00642CC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: File$Delete$Copy
                                                                  • String ID:
                                                                  • API String ID: 3226157194-0
                                                                  • Opcode ID: 52b1d8da83b855279ecffe9b0ab8ab688683e44118ed39674c98ee592b615d0a
                                                                  • Instruction ID: e923ec9d9936429de03cc282c9dcfaecb72f35fb7ec676fec69b1678ee6b1cf5
                                                                  • Opcode Fuzzy Hash: 52b1d8da83b855279ecffe9b0ab8ab688683e44118ed39674c98ee592b615d0a
                                                                  • Instruction Fuzzy Hash: 8FB16171D0011EABDF25DBA4CC99EEE7B7EEF48354F5040A6F609E6241EA309A448F61
                                                                  APIs
                                                                  • GetCurrentProcessId.KERNEL32 ref: 0065A427
                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0065A435
                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0065A468
                                                                  • CloseHandle.KERNEL32(?), ref: 0065A63D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CloseCountersCurrentHandleOpen
                                                                  • String ID:
                                                                  • API String ID: 3488606520-0
                                                                  • Opcode ID: b492a60392a1f89b5044e8c3fea4e7edd7973921dac822e5f13bfcf6705ce475
                                                                  • Instruction ID: fc8e90df49893e20ff1b8d3456d53c3293360ea1aed867ebd6ef00189baef4d6
                                                                  • Opcode Fuzzy Hash: b492a60392a1f89b5044e8c3fea4e7edd7973921dac822e5f13bfcf6705ce475
                                                                  • Instruction Fuzzy Hash: C4A180716043029FD720DF18C885B6ABBE6AF84714F14891DF9999B3D2D7B0EC45CB51
                                                                  APIs
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00673700), ref: 0060BB91
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,006A121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0060BC09
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,006A1270,000000FF,?,0000003F,00000000,?), ref: 0060BC36
                                                                  • _free.LIBCMT ref: 0060BB7F
                                                                    • Part of subcall function 006029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000), ref: 006029DE
                                                                    • Part of subcall function 006029C8: GetLastError.KERNEL32(00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000,00000000), ref: 006029F0
                                                                  • _free.LIBCMT ref: 0060BD4B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                  • String ID:
                                                                  • API String ID: 1286116820-0
                                                                  • Opcode ID: 76c0f0e4ffe253267bbb8b2afc0333f15df7ce8745b4c9a1d1d4fd159075d81d
                                                                  • Instruction ID: b7b6b3c21c376fdfb20e5daaa512a5bf3dd5e5b18939532711f5743e650c25fd
                                                                  • Opcode Fuzzy Hash: 76c0f0e4ffe253267bbb8b2afc0333f15df7ce8745b4c9a1d1d4fd159075d81d
                                                                  • Instruction Fuzzy Hash: BD512B718802099FDB18EF659C419AFB7BEEF42320F10926EE450D72D1EB709E818B54
                                                                  APIs
                                                                    • Part of subcall function 0063DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0063CF22,?), ref: 0063DDFD
                                                                    • Part of subcall function 0063DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0063CF22,?), ref: 0063DE16
                                                                    • Part of subcall function 0063E199: GetFileAttributesW.KERNEL32(?,0063CF95), ref: 0063E19A
                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0063E473
                                                                  • MoveFileW.KERNEL32(?,?), ref: 0063E4AC
                                                                  • _wcslen.LIBCMT ref: 0063E5EB
                                                                  • _wcslen.LIBCMT ref: 0063E603
                                                                  • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0063E650
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 3183298772-0
                                                                  • Opcode ID: 8ee0981d924e23fb924437cb049cd92b9e842fce3a37d5607bbd8f8f5ea1acd4
                                                                  • Instruction ID: a55a551998a605c81b68eb8d4718b6d84337c9d9473687f2af9d45927a6fb93e
                                                                  • Opcode Fuzzy Hash: 8ee0981d924e23fb924437cb049cd92b9e842fce3a37d5607bbd8f8f5ea1acd4
                                                                  • Instruction Fuzzy Hash: BE51C5B24083455BC724DB90DC859EF77DDAF84300F00091EF689D3192EF75A58887AA
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                    • Part of subcall function 0065C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0065B6AE,?,?), ref: 0065C9B5
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065C9F1
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065CA68
                                                                    • Part of subcall function 0065C998: _wcslen.LIBCMT ref: 0065CA9E
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0065BAA5
                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0065BB00
                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0065BB63
                                                                  • RegCloseKey.ADVAPI32(?,?), ref: 0065BBA6
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0065BBB3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                  • String ID:
                                                                  • API String ID: 826366716-0
                                                                  • Opcode ID: 6023fed51d52d7db353b0a548a213237d89ca4ac63b4adf5df55b91d9124a8cc
                                                                  • Instruction ID: da35d82b0460b75acbb10950e8d5ba51d7928900fb75fbac6365f22338bf70d0
                                                                  • Opcode Fuzzy Hash: 6023fed51d52d7db353b0a548a213237d89ca4ac63b4adf5df55b91d9124a8cc
                                                                  • Instruction Fuzzy Hash: 8D61B031208242AFD314DF14C494E6ABBE6FF84318F14955DF8998B3A2DB71ED49CB92
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(?), ref: 00638BCD
                                                                  • VariantClear.OLEAUT32 ref: 00638C3E
                                                                  • VariantClear.OLEAUT32 ref: 00638C9D
                                                                  • VariantClear.OLEAUT32(?), ref: 00638D10
                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00638D3B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$Clear$ChangeInitType
                                                                  • String ID:
                                                                  • API String ID: 4136290138-0
                                                                  • Opcode ID: d0bf2db6c4c18240826a6999e824fa6a6913201f551f2fa9c180fd51721f69fe
                                                                  • Instruction ID: dedfed6754a5979168a74064d0075ff2839d2efe078d474640897da3bb65d57e
                                                                  • Opcode Fuzzy Hash: d0bf2db6c4c18240826a6999e824fa6a6913201f551f2fa9c180fd51721f69fe
                                                                  • Instruction Fuzzy Hash: 405136B5A00619AFCB14CF68C894AAAB7F9FF89310F158559F905DB350EB30E911CBA0
                                                                  APIs
                                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00648BAE
                                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00648BDA
                                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00648C32
                                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00648C57
                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00648C5F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: PrivateProfile$SectionWrite$String
                                                                  • String ID:
                                                                  • API String ID: 2832842796-0
                                                                  • Opcode ID: 8eb4fc29168cc0166e3e43463fde0958e94bab29f1caea0064faea2447d6af12
                                                                  • Instruction ID: 7adcdba04cf82268f04b39bd60f56620f20d4b93f02e3ef433408a219063e19a
                                                                  • Opcode Fuzzy Hash: 8eb4fc29168cc0166e3e43463fde0958e94bab29f1caea0064faea2447d6af12
                                                                  • Instruction Fuzzy Hash: 88515F35A002199FCB14DF65C884AADBBF6FF48314F08805AE849AB362DB31ED41CB91
                                                                  APIs
                                                                  • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00658F40
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00658FD0
                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00658FEC
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00659032
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00659052
                                                                    • Part of subcall function 005EF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00641043,?,7529E610), ref: 005EF6E6
                                                                    • Part of subcall function 005EF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0062FA64,00000000,00000000,?,?,00641043,?,7529E610,?,0062FA64), ref: 005EF70D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                  • String ID:
                                                                  • API String ID: 666041331-0
                                                                  • Opcode ID: 3e2e332795522f4f9d496444892963e07d394c8984cd753cf02cb594d1508dff
                                                                  • Instruction ID: a9bc2b3c26635eb7ea41b42f0951e60a5ee56f62f5d9ed3ec04eee09fb4e4ec9
                                                                  • Opcode Fuzzy Hash: 3e2e332795522f4f9d496444892963e07d394c8984cd753cf02cb594d1508dff
                                                                  • Instruction Fuzzy Hash: C2513C35600206DFC715DF58C4948ADBBB2FF89325F05809AE845AB762DB31ED8ACF91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 7a4729bc28fbade243fa1b7caae614bddbf1b4226137c1897e0572ae99b5e430
                                                                  • Instruction ID: ee715d8c7bcc5e371e03231c8bbb8b319c4fd1f7ec9620ee49353d7fb15d37e8
                                                                  • Opcode Fuzzy Hash: 7a4729bc28fbade243fa1b7caae614bddbf1b4226137c1897e0572ae99b5e430
                                                                  • Instruction Fuzzy Hash: 9A41E632A403019FCB28DF78C894A9EB7B6EF89314F1545A9E615EB391DA31AD01CB80
                                                                  APIs
                                                                  • GetCursorPos.USER32(?), ref: 005E9141
                                                                  • ScreenToClient.USER32(00000000,?), ref: 005E915E
                                                                  • GetAsyncKeyState.USER32(00000001), ref: 005E9183
                                                                  • GetAsyncKeyState.USER32(00000002), ref: 005E919D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                  • String ID:
                                                                  • API String ID: 4210589936-0
                                                                  • Opcode ID: 8472659fa6a8bc3bce704a774992b712f72d606d59d9125654cd838167b7c05d
                                                                  • Instruction ID: 471503d285b6772bbd02fdd6c324b19f78d3ae90830ffe4bb566e44a857284b8
                                                                  • Opcode Fuzzy Hash: 8472659fa6a8bc3bce704a774992b712f72d606d59d9125654cd838167b7c05d
                                                                  • Instruction Fuzzy Hash: 3C41707190891BFBDF099F65D848BEEBB75FF45324F248219E469A3290C7305960CF91
                                                                  APIs
                                                                  • GetInputState.USER32 ref: 006438CB
                                                                  • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00643922
                                                                  • TranslateMessage.USER32(?), ref: 0064394B
                                                                  • DispatchMessageW.USER32(?), ref: 00643955
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00643966
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                  • String ID:
                                                                  • API String ID: 2256411358-0
                                                                  • Opcode ID: d443fe160682bc3f8bde592a4943e9e496e72bda2905e2eacc56c384cbfa66ab
                                                                  • Instruction ID: d3edcf035987d0f1f7f0a1f87aecc6083898837291757ac9c168013471c58f57
                                                                  • Opcode Fuzzy Hash: d443fe160682bc3f8bde592a4943e9e496e72bda2905e2eacc56c384cbfa66ab
                                                                  • Instruction Fuzzy Hash: 1A31C8709043669EEB25DB349848BF677ABAB06304F04055DD4A2863A0F3F4A685CF11
                                                                  APIs
                                                                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0064C21E,00000000), ref: 0064CF38
                                                                  • InternetReadFile.WININET(?,00000000,?,?), ref: 0064CF6F
                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,0064C21E,00000000), ref: 0064CFB4
                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0064C21E,00000000), ref: 0064CFC8
                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0064C21E,00000000), ref: 0064CFF2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                  • String ID:
                                                                  • API String ID: 3191363074-0
                                                                  • Opcode ID: dc9d7c998699bc1c6a5150d4d9771e6f6acfa216239cb8ad1df53f81d2606581
                                                                  • Instruction ID: 6892af04e642290540eb3d244fabca7b82d2d5246c5f8c0a05cc74b45b30b010
                                                                  • Opcode Fuzzy Hash: dc9d7c998699bc1c6a5150d4d9771e6f6acfa216239cb8ad1df53f81d2606581
                                                                  • Instruction Fuzzy Hash: 91317C71601605EFDBA4DFA5C884AABBBFAEF14320B10442EF546D2301DB34AE45DB60
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 00631915
                                                                  • PostMessageW.USER32(00000001,00000201,00000001), ref: 006319C1
                                                                  • Sleep.KERNEL32(00000000,?,?,?), ref: 006319C9
                                                                  • PostMessageW.USER32(00000001,00000202,00000000), ref: 006319DA
                                                                  • Sleep.KERNEL32(00000000,?,?,?,?), ref: 006319E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePostSleep$RectWindow
                                                                  • String ID:
                                                                  • API String ID: 3382505437-0
                                                                  • Opcode ID: 21d3418361c7f15dd6832e738755a4dc92918e25d3a547ac8bc270fce67db6fd
                                                                  • Instruction ID: b71a29a15e065c03ded6b51f5aeb36199f0244286082531a13eb7ae96b40a130
                                                                  • Opcode Fuzzy Hash: 21d3418361c7f15dd6832e738755a4dc92918e25d3a547ac8bc270fce67db6fd
                                                                  • Instruction Fuzzy Hash: 1F31C271900219EFCB04CFA8CD99BEE7BB6EB45325F104229F961EB2D1C7B09954DB90
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00665745
                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 0066579D
                                                                  • _wcslen.LIBCMT ref: 006657AF
                                                                  • _wcslen.LIBCMT ref: 006657BA
                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00665816
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$_wcslen
                                                                  • String ID:
                                                                  • API String ID: 763830540-0
                                                                  • Opcode ID: aa28f0b840b33132a9f6678c5a167e13b937a3e5b26d680d29651847fdd96002
                                                                  • Instruction ID: c6cf3dfe9260e05c490ca0398d6ffd371114c2bfc3b348631c2ef02bae4ee7c5
                                                                  • Opcode Fuzzy Hash: aa28f0b840b33132a9f6678c5a167e13b937a3e5b26d680d29651847fdd96002
                                                                  • Instruction Fuzzy Hash: 8A21D871904619DADB209F60CC86AEE7BBAFF44724F108256F92AEB2C0D7749985CF50
                                                                  APIs
                                                                  • IsWindow.USER32(00000000), ref: 00650951
                                                                  • GetForegroundWindow.USER32 ref: 00650968
                                                                  • GetDC.USER32(00000000), ref: 006509A4
                                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 006509B0
                                                                  • ReleaseDC.USER32(00000000,00000003), ref: 006509E8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ForegroundPixelRelease
                                                                  • String ID:
                                                                  • API String ID: 4156661090-0
                                                                  • Opcode ID: 0ea1e90ebf6bfabf14000e2989313fc823f9c234ce65668d6d027ac3337dd96a
                                                                  • Instruction ID: 053bf697926f3b7c142dd0d4f8f9d98aa9fffb1f9d04bf92db2b44d00d88c690
                                                                  • Opcode Fuzzy Hash: 0ea1e90ebf6bfabf14000e2989313fc823f9c234ce65668d6d027ac3337dd96a
                                                                  • Instruction Fuzzy Hash: 4A218135600604AFE714EF69D888AAEBBE6FF45711F04806DE84AD7352DB70EC44CB90
                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0060CDC6
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0060CDE9
                                                                    • Part of subcall function 00603820: RtlAllocateHeap.NTDLL(00000000,?,006A1444,?,005EFDF5,?,?,005DA976,00000010,006A1440,005D13FC,?,005D13C6,?,005D1129), ref: 00603852
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0060CE0F
                                                                  • _free.LIBCMT ref: 0060CE22
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0060CE31
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                  • String ID:
                                                                  • API String ID: 336800556-0
                                                                  • Opcode ID: db226ce47d7fc03b66bbb47f0fcf4bb15832a23d76bdebedafc0e6c4c50fb1a0
                                                                  • Instruction ID: 268e94e048c69eb7e2ec69ea1f04439176a57648288cbc8a3ab56c24bb3a0ae1
                                                                  • Opcode Fuzzy Hash: db226ce47d7fc03b66bbb47f0fcf4bb15832a23d76bdebedafc0e6c4c50fb1a0
                                                                  • Instruction Fuzzy Hash: 9301B5726416157FE32517BAAC4CC7B696FDFC6BB13150229FD05D6380DA608D0191B0
                                                                  APIs
                                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005E9693
                                                                  • SelectObject.GDI32(?,00000000), ref: 005E96A2
                                                                  • BeginPath.GDI32(?), ref: 005E96B9
                                                                  • SelectObject.GDI32(?,00000000), ref: 005E96E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                  • String ID:
                                                                  • API String ID: 3225163088-0
                                                                  • Opcode ID: 016577b0f7bd5894375485bb8d991d0a29af9a7679d6fdbc1e557770c9dd6dfc
                                                                  • Instruction ID: 1bdea61754c26b336252c0f7bbaf1abd3de955b35def1a8866a74805586bf55f
                                                                  • Opcode Fuzzy Hash: 016577b0f7bd5894375485bb8d991d0a29af9a7679d6fdbc1e557770c9dd6dfc
                                                                  • Instruction Fuzzy Hash: AC218330801385EBDB11AF65EC147EA7F66BB43365F101217F4909A1B0D3706991CF94
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _memcmp
                                                                  • String ID:
                                                                  • API String ID: 2931989736-0
                                                                  • Opcode ID: d0d5bbb334e59dc7abe243707262d3588bc3195510bf557b01ea5506973c2b8f
                                                                  • Instruction ID: c27a76d7ae4e15d1a942633398af53d925dc6fc57f477dd7e2876830e8e73b19
                                                                  • Opcode Fuzzy Hash: d0d5bbb334e59dc7abe243707262d3588bc3195510bf557b01ea5506973c2b8f
                                                                  • Instruction Fuzzy Hash: CE01B561645A0AFBD2085610AD82FFB736FAB71394F414420FE069B281F764ED11C2E5
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,?,005FF2DE,00603863,006A1444,?,005EFDF5,?,?,005DA976,00000010,006A1440,005D13FC,?,005D13C6), ref: 00602DFD
                                                                  • _free.LIBCMT ref: 00602E32
                                                                  • _free.LIBCMT ref: 00602E59
                                                                  • SetLastError.KERNEL32(00000000,005D1129), ref: 00602E66
                                                                  • SetLastError.KERNEL32(00000000,005D1129), ref: 00602E6F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free
                                                                  • String ID:
                                                                  • API String ID: 3170660625-0
                                                                  • Opcode ID: 1596afe3c7c25deafbfadf1dcd7c6b78ca1f47bcf8742ee083584efdfb0e0112
                                                                  • Instruction ID: 5a3bf441b151e3b4b303bc2d7322360b02ffb5ad8ae4d37e43130a6c8aa6deef
                                                                  • Opcode Fuzzy Hash: 1596afe3c7c25deafbfadf1dcd7c6b78ca1f47bcf8742ee083584efdfb0e0112
                                                                  • Instruction Fuzzy Hash: D301F4362C5A0267C71A3735ACADD6B265FAFD17B5B21042DF965A23E2EF608C014124
                                                                  APIs
                                                                  • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?,?,?,0063035E), ref: 0063002B
                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?,?), ref: 00630046
                                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?,?), ref: 00630054
                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?), ref: 00630064
                                                                  • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0062FF41,80070057,?,?), ref: 00630070
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 3897988419-0
                                                                  • Opcode ID: 23aafc679a53d053e0da4cf3d34f2820e3119b44c3ee03562a5ece636140a71f
                                                                  • Instruction ID: c9d602c31deaa4cd0437d9bf09a819b06e661b626f8497759a9441fbd566ff24
                                                                  • Opcode Fuzzy Hash: 23aafc679a53d053e0da4cf3d34f2820e3119b44c3ee03562a5ece636140a71f
                                                                  • Instruction Fuzzy Hash: 61018B72600618BFEB245F68DC44BAA7EAFEB447A2F149128F945D3210E7B5DD448BE0
                                                                  APIs
                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0063E997
                                                                  • QueryPerformanceFrequency.KERNEL32(?), ref: 0063E9A5
                                                                  • Sleep.KERNEL32(00000000), ref: 0063E9AD
                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0063E9B7
                                                                  • Sleep.KERNEL32 ref: 0063E9F3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                  • String ID:
                                                                  • API String ID: 2833360925-0
                                                                  • Opcode ID: 6e75462a1994288ef64d39899b8e1f040beff9492093b5bf5c2385d972c5a4d7
                                                                  • Instruction ID: d4de55aeab07ec2d2811854dd5331b6df8f042268eb14a5e92a2559792e6849f
                                                                  • Opcode Fuzzy Hash: 6e75462a1994288ef64d39899b8e1f040beff9492093b5bf5c2385d972c5a4d7
                                                                  • Instruction Fuzzy Hash: B0015B31C01929DBCF00ABE4DC596EDBBBABB09311F000546E542B2280CB75965287A1
                                                                  APIs
                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00631114
                                                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 00631120
                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 0063112F
                                                                  • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00630B9B,?,?,?), ref: 00631136
                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0063114D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 842720411-0
                                                                  • Opcode ID: 9bc3778b834324713a5e95101fe0410792e656c6d9ae0c057eeb6b05503bbd79
                                                                  • Instruction ID: a1ceec18a0659ac9dbae80482ab0b5a4fff31aa154ba769b6e71ef00b43bf378
                                                                  • Opcode Fuzzy Hash: 9bc3778b834324713a5e95101fe0410792e656c6d9ae0c057eeb6b05503bbd79
                                                                  • Instruction Fuzzy Hash: 00011975200605BFDB114FA5DC49AAA3F6FEF8A3A0B204419FA85D7360DA72DC009AA0
                                                                  APIs
                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00630FCA
                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00630FD6
                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00630FE5
                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00630FEC
                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00631002
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 44706859-0
                                                                  • Opcode ID: 2b559ef4c45ecba9f5bd50009bfcb987e52ae4c000f85ad7ba89d3d6aee9bd78
                                                                  • Instruction ID: 7e608253892b8b9ef80b627d3e4eeeb99541316b78a185a5035e1c7329ade96b
                                                                  • Opcode Fuzzy Hash: 2b559ef4c45ecba9f5bd50009bfcb987e52ae4c000f85ad7ba89d3d6aee9bd78
                                                                  • Instruction Fuzzy Hash: 7DF04F35100701BBD7214FA5DC49FA63B6EEF8A761F105414F985DA251CAB1DC408A60
                                                                  APIs
                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0063102A
                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00631036
                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00631045
                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0063104C
                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00631062
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 44706859-0
                                                                  • Opcode ID: b647df0c4f572436bae5949653be69c4fbcc75a3bf0bccd63a07782b3b202ff5
                                                                  • Instruction ID: dddd22675b1bd879d20e333ee0a9c3319aeca6e3305c7581c6c915a98a4a6c88
                                                                  • Opcode Fuzzy Hash: b647df0c4f572436bae5949653be69c4fbcc75a3bf0bccd63a07782b3b202ff5
                                                                  • Instruction Fuzzy Hash: D8F04F35200705BBD7215FA5EC59FA63B6EEF8A761F101414F985DA250CAB1D8808A60
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(?,?,?,?,0064017D,?,006432FC,?,00000001,00612592,?), ref: 00640324
                                                                  • CloseHandle.KERNEL32(?,?,?,?,0064017D,?,006432FC,?,00000001,00612592,?), ref: 00640331
                                                                  • CloseHandle.KERNEL32(?,?,?,?,0064017D,?,006432FC,?,00000001,00612592,?), ref: 0064033E
                                                                  • CloseHandle.KERNEL32(?,?,?,?,0064017D,?,006432FC,?,00000001,00612592,?), ref: 0064034B
                                                                  • CloseHandle.KERNEL32(?,?,?,?,0064017D,?,006432FC,?,00000001,00612592,?), ref: 00640358
                                                                  • CloseHandle.KERNEL32(?,?,?,?,0064017D,?,006432FC,?,00000001,00612592,?), ref: 00640365
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: 59bef1dddc637853fd2abfbaea283881a32b4d93fc45100a70713a5154292ff8
                                                                  • Instruction ID: 49dc10c82273be8be8e7356d83af3ee1148b72e9f2b88e09040ee61f1d4f6dfa
                                                                  • Opcode Fuzzy Hash: 59bef1dddc637853fd2abfbaea283881a32b4d93fc45100a70713a5154292ff8
                                                                  • Instruction Fuzzy Hash: DB01A276800B269FD7319F66D890452FBF6BF503153158A3FD29652A31C3B1A954CF80
                                                                  APIs
                                                                  • _free.LIBCMT ref: 0060D752
                                                                    • Part of subcall function 006029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000), ref: 006029DE
                                                                    • Part of subcall function 006029C8: GetLastError.KERNEL32(00000000,?,0060D7D1,00000000,00000000,00000000,00000000,?,0060D7F8,00000000,00000007,00000000,?,0060DBF5,00000000,00000000), ref: 006029F0
                                                                  • _free.LIBCMT ref: 0060D764
                                                                  • _free.LIBCMT ref: 0060D776
                                                                  • _free.LIBCMT ref: 0060D788
                                                                  • _free.LIBCMT ref: 0060D79A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 2a2a11a5f2f9827429a4c1f35d8194e5c1155f73d939b9617729bc6a1ec1f4b4
                                                                  • Instruction ID: 05ab167edcf3497fc886b38034afa4059867717ec6e29bebfd27b37465990094
                                                                  • Opcode Fuzzy Hash: 2a2a11a5f2f9827429a4c1f35d8194e5c1155f73d939b9617729bc6a1ec1f4b4
                                                                  • Instruction Fuzzy Hash: B9F0FF32584205ABC669EBA9F9D5C5B7BDFBF447207A41D0AF048E7A81C720FC8086A4
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00635C58
                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00635C6F
                                                                  • MessageBeep.USER32(00000000), ref: 00635C87
                                                                  • KillTimer.USER32(?,0000040A), ref: 00635CA3
                                                                  • EndDialog.USER32(?,00000001), ref: 00635CBD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                  • String ID:
                                                                  • API String ID: 3741023627-0
                                                                  • Opcode ID: 7b6e41a8e7fd6b97227d848f1a5c12021d0948b4e7c0f9c7dbd90cff4b2e39ff
                                                                  • Instruction ID: 95d3e755d365576dfc50604e9937251157e9b8e1a81d8373352930f09ffb6f9d
                                                                  • Opcode Fuzzy Hash: 7b6e41a8e7fd6b97227d848f1a5c12021d0948b4e7c0f9c7dbd90cff4b2e39ff
                                                                  • Instruction Fuzzy Hash: 0A018630500B04ABEB205B14DD4EFE67BBABB00B05F04255EE583A25E1DBF4A985CA95
                                                                  APIs
                                                                  • EndPath.GDI32(?), ref: 005E95D4
                                                                  • StrokeAndFillPath.GDI32(?,?,006271F7,00000000,?,?,?), ref: 005E95F0
                                                                  • SelectObject.GDI32(?,00000000), ref: 005E9603
                                                                  • DeleteObject.GDI32 ref: 005E9616
                                                                  • StrokePath.GDI32(?), ref: 005E9631
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                  • String ID:
                                                                  • API String ID: 2625713937-0
                                                                  • Opcode ID: 3725ac777fc06b0552b2f9d4c42c935fc4103861c7d716434e0f0ef6839fa5cb
                                                                  • Instruction ID: 03df4aacfc50f14486d9076dcaa75d034fbfb4c981e2bb3111b73457793e2496
                                                                  • Opcode Fuzzy Hash: 3725ac777fc06b0552b2f9d4c42c935fc4103861c7d716434e0f0ef6839fa5cb
                                                                  • Instruction Fuzzy Hash: 0EF03C30005648EBDB166F66ED1C7763F62BB03372F04A215F4A5590F0C7719995DF60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: __freea$_free
                                                                  • String ID: a/p$am/pm
                                                                  • API String ID: 3432400110-3206640213
                                                                  • Opcode ID: 6fae9175de25deadc1985b062e9205aff4635f5785a80bf038460e6ae472fef5
                                                                  • Instruction ID: 28756b4388023eb09a5c907d0db8563f1b10d61d59028b128ddcdcb832a305f6
                                                                  • Opcode Fuzzy Hash: 6fae9175de25deadc1985b062e9205aff4635f5785a80bf038460e6ae472fef5
                                                                  • Instruction Fuzzy Hash: A5D1BD31980206DADB2C9F68C895AFBB7B6EF07300F28415AE9419F7D0D6759E81CB91
                                                                  APIs
                                                                    • Part of subcall function 005F0242: EnterCriticalSection.KERNEL32(006A070C,006A1884,?,?,005E198B,006A2518,?,?,?,005D12F9,00000000), ref: 005F024D
                                                                    • Part of subcall function 005F0242: LeaveCriticalSection.KERNEL32(006A070C,?,005E198B,006A2518,?,?,?,005D12F9,00000000), ref: 005F028A
                                                                    • Part of subcall function 005F00A3: __onexit.LIBCMT ref: 005F00A9
                                                                  • __Init_thread_footer.LIBCMT ref: 00656238
                                                                    • Part of subcall function 005F01F8: EnterCriticalSection.KERNEL32(006A070C,?,?,005E8747,006A2514), ref: 005F0202
                                                                    • Part of subcall function 005F01F8: LeaveCriticalSection.KERNEL32(006A070C,?,005E8747,006A2514), ref: 005F0235
                                                                    • Part of subcall function 0064359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006435E4
                                                                    • Part of subcall function 0064359C: LoadStringW.USER32(006A2390,?,00000FFF,?), ref: 0064360A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                  • String ID: x#j$x#j$x#j
                                                                  • API String ID: 1072379062-3560744321
                                                                  • Opcode ID: 735531b6dc65e981f1c7489ff1e349a1d7df2deef23053efd9059e6bfd09cca5
                                                                  • Instruction ID: dcfea21cd3f899911ea7f88ff861d8df842fd9c9eb0d9f99aa97e122d433a0c2
                                                                  • Opcode Fuzzy Hash: 735531b6dc65e981f1c7489ff1e349a1d7df2deef23053efd9059e6bfd09cca5
                                                                  • Instruction Fuzzy Hash: 2CC15C71A00106ABCB14DF58C895EBEBBBAFF49300F54806AF9559B391DB70ED49CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: JO]
                                                                  • API String ID: 0-3765940103
                                                                  • Opcode ID: 5541e94367b20924d37bef0053b5f561889ee93b16767cfa8810d6486d2a109b
                                                                  • Instruction ID: f2e1d0329876f839b2f73def01402b5162ebecb92f999d089e60f11c903dc5b6
                                                                  • Opcode Fuzzy Hash: 5541e94367b20924d37bef0053b5f561889ee93b16767cfa8810d6486d2a109b
                                                                  • Instruction Fuzzy Hash: 6551EE7598060A9FDF29AFA4C849AFFBFBAAF45314F14001AE402A72D1D7759901CF61
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00608B6E
                                                                  • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00608B7A
                                                                  • __dosmaperr.LIBCMT ref: 00608B81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                  • String ID: ._
                                                                  • API String ID: 2434981716-1383207595
                                                                  • Opcode ID: c593f07f2b443e9fff84eef48ab7fbf0809afb5e39204a5368131a49a5dada0a
                                                                  • Instruction ID: 9ed32caa1fa4001788c02024e33bc3bb64fe9bb079577ecd043efd00a830cd8d
                                                                  • Opcode Fuzzy Hash: c593f07f2b443e9fff84eef48ab7fbf0809afb5e39204a5368131a49a5dada0a
                                                                  • Instruction Fuzzy Hash: A1415B70644155AFDB28DF24CC80ABF7FA7DB86314B2841A9F8C597692DF318C038B90
                                                                  APIs
                                                                    • Part of subcall function 0063B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006321D0,?,?,00000034,00000800,?,00000034), ref: 0063B42D
                                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00632760
                                                                    • Part of subcall function 0063B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006321FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0063B3F8
                                                                    • Part of subcall function 0063B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0063B355
                                                                    • Part of subcall function 0063B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00632194,00000034,?,?,00001004,00000000,00000000), ref: 0063B365
                                                                    • Part of subcall function 0063B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00632194,00000034,?,?,00001004,00000000,00000000), ref: 0063B37B
                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006327CD
                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0063281A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                  • String ID: @
                                                                  • API String ID: 4150878124-2766056989
                                                                  • Opcode ID: 97c426f32fb26edd6c8d789df498d52e1a6eb370a318295c5ec99d4a7f0d0743
                                                                  • Instruction ID: 2819f319e8fbcaa4c19fc2ba6ab796abc70b5016f5c841b521aeeb2643668446
                                                                  • Opcode Fuzzy Hash: 97c426f32fb26edd6c8d789df498d52e1a6eb370a318295c5ec99d4a7f0d0743
                                                                  • Instruction Fuzzy Hash: 30416D72900229BFDB10DFA4CC55AEEBBB9EF09300F105099FA55B7281DB706E45CBA0
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\shipping documents.exe,00000104), ref: 00601769
                                                                  • _free.LIBCMT ref: 00601834
                                                                  • _free.LIBCMT ref: 0060183E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$FileModuleName
                                                                  • String ID: C:\Users\user\Desktop\shipping documents.exe
                                                                  • API String ID: 2506810119-4054625304
                                                                  • Opcode ID: bde434e478a1d9399ceb54f6a54cf10b2adbfc6d534eccee854d592460fce6c7
                                                                  • Instruction ID: 69e1ecb40d24d274b18bc7b3fc3e94b0a7f2351a5bb653cfec80a1aa3a313962
                                                                  • Opcode Fuzzy Hash: bde434e478a1d9399ceb54f6a54cf10b2adbfc6d534eccee854d592460fce6c7
                                                                  • Instruction Fuzzy Hash: 97317E75A80218ABDB25DF999885DDFBBBEEF86310F10416AE4049B291D6B09F40CB90
                                                                  APIs
                                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0063C306
                                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 0063C34C
                                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006A1990,00E25CB8), ref: 0063C395
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Delete$InfoItem
                                                                  • String ID: 0
                                                                  • API String ID: 135850232-4108050209
                                                                  • Opcode ID: 621ac0ffd47e81cab52213e80b9fdefc4902e2ad60116f326ec3f91bc960ae3a
                                                                  • Instruction ID: ae433856271ba1b3141a7a3ec919f2ac94ac90e5e7b8343c3e9de553d51f3edb
                                                                  • Opcode Fuzzy Hash: 621ac0ffd47e81cab52213e80b9fdefc4902e2ad60116f326ec3f91bc960ae3a
                                                                  • Instruction Fuzzy Hash: A041B1712043019FE720DF24D884B6ABBE6AF85320F048A1EF9A5A73D1D770E904CB92
                                                                  APIs
                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0066CC08,00000000,?,?,?,?), ref: 006644AA
                                                                  • GetWindowLongW.USER32 ref: 006644C7
                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 006644D7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long
                                                                  • String ID: SysTreeView32
                                                                  • API String ID: 847901565-1698111956
                                                                  • Opcode ID: 31bc9587b0f8738a1a2a9b548f177e6e17cf9a6d95afa651500949e716fbfc28
                                                                  • Instruction ID: ed4d93406e56cec89521553109a8f79afcde986c28b3684376b0e793266bf4e7
                                                                  • Opcode Fuzzy Hash: 31bc9587b0f8738a1a2a9b548f177e6e17cf9a6d95afa651500949e716fbfc28
                                                                  • Instruction Fuzzy Hash: 5831AD31210606AFDF219E38DC46BEA7BAAEB49334F204315F975922E0DB70EC519B50
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0066461F
                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00664634
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: '$h\
                                                                  • API String ID: 3850602802-1474427137
                                                                  • Opcode ID: 80804d2e1e7dd2726de9756b0761bc9595d2d32e022f5f195ab519e554411635
                                                                  • Instruction ID: 53b90f3539537b322ce169176998b3bbc42c4e812b32979a1f1c502f33b8fcd2
                                                                  • Opcode Fuzzy Hash: 80804d2e1e7dd2726de9756b0761bc9595d2d32e022f5f195ab519e554411635
                                                                  • Instruction Fuzzy Hash: 5E311874A0120A9FDF14CFA9C990BDA7BB6FF49340F14406AE905EB351DB70A941CF90
                                                                  APIs
                                                                  • SysReAllocString.OLEAUT32(?,?), ref: 00636EED
                                                                  • VariantCopyInd.OLEAUT32(?,?), ref: 00636F08
                                                                  • VariantClear.OLEAUT32(?), ref: 00636F12
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$AllocClearCopyString
                                                                  • String ID: *jc
                                                                  • API String ID: 2173805711-2167581163
                                                                  • Opcode ID: b08feb1c77388872e553a28fe962dce4019719eefc4e4c5b32dbdb182f9ab259
                                                                  • Instruction ID: 3d08214f1d402fddd94579194d56eb1b796409a3bfc9ef8b57998f04b9b54f51
                                                                  • Opcode Fuzzy Hash: b08feb1c77388872e553a28fe962dce4019719eefc4e4c5b32dbdb182f9ab259
                                                                  • Instruction Fuzzy Hash: 1C316B71604256EBCB14AF69E8549BD3BB7BF84300F10449AF8064B3B1DB309912DBE4
                                                                  APIs
                                                                    • Part of subcall function 00602D74: GetLastError.KERNEL32(?,?,00605686,00613CD6,?,00000000,?,00605B6A,?,?,?,?,?,005FE6D1,?,00698A48), ref: 00602D78
                                                                    • Part of subcall function 00602D74: _free.LIBCMT ref: 00602DAB
                                                                    • Part of subcall function 00602D74: SetLastError.KERNEL32(00000000,?,?,?,?,005FE6D1,?,00698A48,00000010,005D4F4A,?,?,00000000,00613CD6), ref: 00602DEC
                                                                    • Part of subcall function 00602D74: _abort.LIBCMT ref: 00602DF2
                                                                    • Part of subcall function 0060CADA: _abort.LIBCMT ref: 0060CB0C
                                                                    • Part of subcall function 0060CADA: _free.LIBCMT ref: 0060CB40
                                                                    • Part of subcall function 0060C74F: GetOEMCP.KERNEL32(00000000), ref: 0060C77A
                                                                  • _free.LIBCMT ref: 0060CA33
                                                                  • _free.LIBCMT ref: 0060CA69
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorLast_abort
                                                                  • String ID: H$H
                                                                  • API String ID: 2991157371-2010421380
                                                                  • Opcode ID: f1db3603a388754d0ab56ebe53b052b7893700f31eb87ac220ae6d5ec41fc331
                                                                  • Instruction ID: 04ccbf7b422cd4cbfe9767e5b9adcd39bfce044dddfc3ff98ba3340e7a91ff54
                                                                  • Opcode Fuzzy Hash: f1db3603a388754d0ab56ebe53b052b7893700f31eb87ac220ae6d5ec41fc331
                                                                  • Instruction Fuzzy Hash: D5319331A84108AFDB18EFA9D455BAA7BF6EF40330F21029EF9049B2D2EB315D41DB54
                                                                  APIs
                                                                    • Part of subcall function 0065335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00653077,?,?), ref: 00653378
                                                                  • inet_addr.WSOCK32(?), ref: 0065307A
                                                                  • _wcslen.LIBCMT ref: 0065309B
                                                                  • htons.WSOCK32(00000000), ref: 00653106
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                  • String ID: 255.255.255.255
                                                                  • API String ID: 946324512-2422070025
                                                                  • Opcode ID: 034fba77fc26f1ad7d27b49d345bed7b276775a97960245f769bdcb8a13a7f1a
                                                                  • Instruction ID: e08e358eaf7582bd8daa9a9b63662d11a046acada5e116fb98c005932119ea48
                                                                  • Opcode Fuzzy Hash: 034fba77fc26f1ad7d27b49d345bed7b276775a97960245f769bdcb8a13a7f1a
                                                                  • Instruction Fuzzy Hash: A331D5352003169FCB20CF28C585EAA7BE2EF55799F248059ED158B392D771DE49C760
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                  • API String ID: 176396367-2734436370
                                                                  • Opcode ID: 8bb078bea5bb2539005ced2cc7a769a2c82007b6cc303d24e9b2b6925ac5ed04
                                                                  • Instruction ID: bcbe3b0203dd5f10092c0caf51a2f40ab16a11ff7e0956836be968a842012c62
                                                                  • Opcode Fuzzy Hash: 8bb078bea5bb2539005ced2cc7a769a2c82007b6cc303d24e9b2b6925ac5ed04
                                                                  • Instruction Fuzzy Hash: 61218E3210461566D331AB289C07FF777DEEF95310F004026FA4997242EBD59D81CAF1
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00663840
                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00663850
                                                                  • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00663876
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$MoveWindow
                                                                  • String ID: Listbox
                                                                  • API String ID: 3315199576-2633736733
                                                                  • Opcode ID: 923be3badf113f537f33bba79ac63243e8c75acdecf2c8c6fc833e39561c51af
                                                                  • Instruction ID: f5fa7221b60bf3bfab919aa228370797f753c148b708f3990df146e805d978ea
                                                                  • Opcode Fuzzy Hash: 923be3badf113f537f33bba79ac63243e8c75acdecf2c8c6fc833e39561c51af
                                                                  • Instruction Fuzzy Hash: EC21B072610228BBEF219F54CC45EFB3B6FEF89760F108118F9009B290C6B1EC5287A0
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00644A08
                                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00644A5C
                                                                  • SetErrorMode.KERNEL32(00000000,?,?,0066CC08), ref: 00644AD0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$InformationVolume
                                                                  • String ID: %lu
                                                                  • API String ID: 2507767853-685833217
                                                                  • Opcode ID: f4e82aafa17f6a49a92310c8eba3e0c9c8220ad2bc33d308f52b973a9cfefcf9
                                                                  • Instruction ID: db0309c6a12a295d1786e3ff7bebab404594a2b6ceca3562a71d4eb4200e2f0b
                                                                  • Opcode Fuzzy Hash: f4e82aafa17f6a49a92310c8eba3e0c9c8220ad2bc33d308f52b973a9cfefcf9
                                                                  • Instruction Fuzzy Hash: 9E317371A00109AFDB10DF54C885EAA7BF9EF49314F148099F905DB362DB71ED45CB61
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0066424F
                                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00664264
                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00664271
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: msctls_trackbar32
                                                                  • API String ID: 3850602802-1010561917
                                                                  • Opcode ID: bbb37590366e489cd710bcc70b8547aaa968c2618bd778b9d536122686db6a88
                                                                  • Instruction ID: bb510d9014428bcd25e55fbbb31afb5edd482da30db4252ec4dee303c9b022e0
                                                                  • Opcode Fuzzy Hash: bbb37590366e489cd710bcc70b8547aaa968c2618bd778b9d536122686db6a88
                                                                  • Instruction Fuzzy Hash: 9811E331240208BEEF205F28CC46FEB7BAEEF86B64F110114FA55E6190D6B1D8519B14
                                                                  APIs
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                    • Part of subcall function 00632DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00632DC5
                                                                    • Part of subcall function 00632DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00632DD6
                                                                    • Part of subcall function 00632DA7: GetCurrentThreadId.KERNEL32 ref: 00632DDD
                                                                    • Part of subcall function 00632DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00632DE4
                                                                  • GetFocus.USER32 ref: 00632F78
                                                                    • Part of subcall function 00632DEE: GetParent.USER32(00000000), ref: 00632DF9
                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00632FC3
                                                                  • EnumChildWindows.USER32(?,0063303B), ref: 00632FEB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                  • String ID: %s%d
                                                                  • API String ID: 1272988791-1110647743
                                                                  • Opcode ID: 93be9bd2a0d3dee65eed0409c1e9b33c61455bbe2c30f1d445b3f4c7186d8d7e
                                                                  • Instruction ID: 237c6cd422f88425945eed17331324ee0575ac389b48a711a3a9e2df1e4e7e8f
                                                                  • Opcode Fuzzy Hash: 93be9bd2a0d3dee65eed0409c1e9b33c61455bbe2c30f1d445b3f4c7186d8d7e
                                                                  • Instruction Fuzzy Hash: 6011D271600206ABDF547F64CC99EED376BAF84314F04507AF909DB292DF7099068BB0
                                                                  APIs
                                                                  • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006658C1
                                                                  • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006658EE
                                                                  • DrawMenuBar.USER32(?), ref: 006658FD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$InfoItem$Draw
                                                                  • String ID: 0
                                                                  • API String ID: 3227129158-4108050209
                                                                  • Opcode ID: 5219d233d4356a8a1f6fec9d8afc2ada5d39a498b6e025668f164b9ff5ff5ad8
                                                                  • Instruction ID: 48b12d0bf5354f7b2638765953d9a493941084192d57da6539fe2c530d0847dd
                                                                  • Opcode Fuzzy Hash: 5219d233d4356a8a1f6fec9d8afc2ada5d39a498b6e025668f164b9ff5ff5ad8
                                                                  • Instruction Fuzzy Hash: 6701A131500248EFDB109F11DC45BAEBBBAFB45360F00809AE88AD6251DF309A90DF30
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(?,006A18B0,0066A364,000000FC,?,00000000,00000000,?,?,?,006276CF,?,?,?,?,?), ref: 00667805
                                                                  • GetFocus.USER32 ref: 0066780D
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                    • Part of subcall function 005E9944: GetWindowLongW.USER32(?,000000EB), ref: 005E9952
                                                                  • SendMessageW.USER32(00E2EC08,000000B0,000001BC,000001C0), ref: 0066787A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long$FocusForegroundMessageSend
                                                                  • String ID: h\
                                                                  • API String ID: 3601265619-2592641360
                                                                  • Opcode ID: 6a28ce14859c61097cffd6ad383884b6db8f1fe8b9f0fee5a2538346e45841f3
                                                                  • Instruction ID: aca1fcf69c722e15622b72bf2a7f7a851a997d85c12bac2b01a879422729d391
                                                                  • Opcode Fuzzy Hash: 6a28ce14859c61097cffd6ad383884b6db8f1fe8b9f0fee5a2538346e45841f3
                                                                  • Instruction Fuzzy Hash: EA018F356065009FC329DB28D85CAB637EBBF8B324F18026DE0558B3A1CB716C02CF50
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0062D3BF
                                                                  • FreeLibrary.KERNEL32 ref: 0062D3E5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeLibraryProc
                                                                  • String ID: GetSystemWow64DirectoryW$X64
                                                                  • API String ID: 3013587201-2590602151
                                                                  • Opcode ID: 8ed14fad56e7569e07a669eedde9537001c6bffb3c9f7808b6fcd85a6789a1ff
                                                                  • Instruction ID: 90ac8aefb888c372905e91e8bc56e22f2c319d1a92334f33c867cbb6ef1164eb
                                                                  • Opcode Fuzzy Hash: 8ed14fad56e7569e07a669eedde9537001c6bffb3c9f7808b6fcd85a6789a1ff
                                                                  • Instruction Fuzzy Hash: A7F05532802E30DBD7319A10EC18AF97B27AF13701B68C415E982E6244EB60CE408ED2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c3690f45a3f6a59bf97c0e98726a24066bd76bd81c7ee0f069cc946462c26248
                                                                  • Instruction ID: eb165dee108bf5066740417c521e670546ccfb6c87d190b71e07bd4363d00bd6
                                                                  • Opcode Fuzzy Hash: c3690f45a3f6a59bf97c0e98726a24066bd76bd81c7ee0f069cc946462c26248
                                                                  • Instruction Fuzzy Hash: 03C14D75A00216EFEB14CFA4C8A4EAEB7B6FF48714F208598E505EB251D731DE45CB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearInitInitializeUninitialize
                                                                  • String ID:
                                                                  • API String ID: 1998397398-0
                                                                  • Opcode ID: a67f2722001168fbe7b48c9a522ffe9029aa42a814b10b25d668bc1cb7e1cab0
                                                                  • Instruction ID: e92017805ed9d8c95a0508d5e4beec968854c37b25e3e28478ed0389c5a24d3a
                                                                  • Opcode Fuzzy Hash: a67f2722001168fbe7b48c9a522ffe9029aa42a814b10b25d668bc1cb7e1cab0
                                                                  • Instruction Fuzzy Hash: 6AA14A756042119FC710DF28C485A2ABBE6FF88755F04895EFD899B362EB30ED05CB92
                                                                  APIs
                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0066FC08,?), ref: 006305F0
                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0066FC08,?), ref: 00630608
                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,0066CC40,000000FF,?,00000000,00000800,00000000,?,0066FC08,?), ref: 0063062D
                                                                  • _memcmp.LIBVCRUNTIME ref: 0063064E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FromProg$FreeTask_memcmp
                                                                  • String ID:
                                                                  • API String ID: 314563124-0
                                                                  • Opcode ID: 2ded2a3fa413c04ffe85aedb54f9339269e9e3791079658a6754d55087537a3e
                                                                  • Instruction ID: 022304b2366de04fdb78115ccfb1923c76fb43b36981ded7a877c7ecce3916b4
                                                                  • Opcode Fuzzy Hash: 2ded2a3fa413c04ffe85aedb54f9339269e9e3791079658a6754d55087537a3e
                                                                  • Instruction Fuzzy Hash: AD811071A00109EFDB04DF94C994DEEB7BAFF89315F104599E506AB250DB71AE0ACBA0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 56e32ca72041bf1a35c9b414ac46a6943609a09458e511141cbc2143c946579a
                                                                  • Instruction ID: c65f95dbaf4077fc7383e84239e33073caad7411ac835d12dd06832732c1dfbc
                                                                  • Opcode Fuzzy Hash: 56e32ca72041bf1a35c9b414ac46a6943609a09458e511141cbc2143c946579a
                                                                  • Instruction Fuzzy Hash: 9C414935600505ABDB256FB98C496FF3EE7FF43B70F1C4229F619DA292E63448815362
                                                                  APIs
                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00651AFD
                                                                  • WSAGetLastError.WSOCK32 ref: 00651B0B
                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00651B8A
                                                                  • WSAGetLastError.WSOCK32 ref: 00651B94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$socket
                                                                  • String ID:
                                                                  • API String ID: 1881357543-0
                                                                  • Opcode ID: f1466b7206b6622a4986f5650e5f1993f3d41bd276f9b8634466d4d7f9fb6e0b
                                                                  • Instruction ID: 114d8bc8e2fabb3a630027303e99995466d1ac18fbcd46d041bd609849a5be39
                                                                  • Opcode Fuzzy Hash: f1466b7206b6622a4986f5650e5f1993f3d41bd276f9b8634466d4d7f9fb6e0b
                                                                  • Instruction Fuzzy Hash: 9641A434600201AFE720AF24C88AF657BE6EB85718F548459F95A9F3D3D7B2DD42CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 869e4901fa37922f656839ccfdd99ea7944430044095a67eb27cf15532d509ff
                                                                  • Instruction ID: 520088067bd3ca8d513427bae123c4d6dbaea9097a50466834509d82c2204d66
                                                                  • Opcode Fuzzy Hash: 869e4901fa37922f656839ccfdd99ea7944430044095a67eb27cf15532d509ff
                                                                  • Instruction Fuzzy Hash: E7412875A40304AFD7299F78CC45BABBBEAEF88710F10856EF141DB6D1D3719A418780
                                                                  APIs
                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00645783
                                                                  • GetLastError.KERNEL32(?,00000000), ref: 006457A9
                                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006457CE
                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006457FA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 3321077145-0
                                                                  • Opcode ID: d2447c6acfb6cd158743bc83463bd2d6f338ede56038a4c574afad90e9fdf67c
                                                                  • Instruction ID: 441a09c1df57d81a03954dc9c5dc81a2015e8950dcd49942b1aeb7cc5ab4171b
                                                                  • Opcode Fuzzy Hash: d2447c6acfb6cd158743bc83463bd2d6f338ede56038a4c574afad90e9fdf67c
                                                                  • Instruction Fuzzy Hash: 46411C35600A11DFCB21DF19C444A59BBE2FF89720F19848AEC4AAB362DB31FD00CB91
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,005F6D71,00000000,00000000,005F82D9,?,005F82D9,?,00000001,005F6D71,?,00000001,005F82D9,005F82D9), ref: 0060D910
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0060D999
                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0060D9AB
                                                                  • __freea.LIBCMT ref: 0060D9B4
                                                                    • Part of subcall function 00603820: RtlAllocateHeap.NTDLL(00000000,?,006A1444,?,005EFDF5,?,?,005DA976,00000010,006A1440,005D13FC,?,005D13C6,?,005D1129), ref: 00603852
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                  • String ID:
                                                                  • API String ID: 2652629310-0
                                                                  • Opcode ID: cc02757bb849c4f7a6b613512ab4d5c9154971800ec6f0dd60c0098be7276fc8
                                                                  • Instruction ID: 2253ae2a2baa030ddcaba798387e5233c67ac5ac09aab7e55165084ffbcd6815
                                                                  • Opcode Fuzzy Hash: cc02757bb849c4f7a6b613512ab4d5c9154971800ec6f0dd60c0098be7276fc8
                                                                  • Instruction Fuzzy Hash: 1331AE72A0020AABDB299FA4DC45EEF7BA6EB41320F054268FC04D6290EB35CD50CB90
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 0063ABF1
                                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 0063AC0D
                                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 0063AC74
                                                                  • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 0063ACC6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                  • String ID:
                                                                  • API String ID: 432972143-0
                                                                  • Opcode ID: 4f5decd169a09a9ad54e11a1175eb8d1cb3e7b8062ac089fd5179ffe1bfab784
                                                                  • Instruction ID: 104aa2ec079e6b54c0280e67cb115284205f86e395e00a440f4b6d7a877ed5e4
                                                                  • Opcode Fuzzy Hash: 4f5decd169a09a9ad54e11a1175eb8d1cb3e7b8062ac089fd5179ffe1bfab784
                                                                  • Instruction Fuzzy Hash: F2310830A046186FEF35CBA5CC087FA7BA7AB85320F04631AE4C5962D1C3758D85A7D6
                                                                  APIs
                                                                  • GetForegroundWindow.USER32 ref: 006616EB
                                                                    • Part of subcall function 00633A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00633A57
                                                                    • Part of subcall function 00633A3D: GetCurrentThreadId.KERNEL32 ref: 00633A5E
                                                                    • Part of subcall function 00633A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006325B3), ref: 00633A65
                                                                  • GetCaretPos.USER32(?), ref: 006616FF
                                                                  • ClientToScreen.USER32(00000000,?), ref: 0066174C
                                                                  • GetForegroundWindow.USER32 ref: 00661752
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                  • String ID:
                                                                  • API String ID: 2759813231-0
                                                                  • Opcode ID: 903a67bab29f8165b742f44ef9b78b811f95a3efcd730397afd138bc228eede1
                                                                  • Instruction ID: 90c8ed0d10d844ffebb3700ed13b12d0be7fd836768610f0f7400eb83838e2ae
                                                                  • Opcode Fuzzy Hash: 903a67bab29f8165b742f44ef9b78b811f95a3efcd730397afd138bc228eede1
                                                                  • Instruction Fuzzy Hash: F1313071D00149AFC710DFA9C885CEEBBF9FF89304B5480AAE455E7311E6319E45CBA0
                                                                  APIs
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0063D501
                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0063D50F
                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0063D52F
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0063D5DC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 420147892-0
                                                                  • Opcode ID: 3807d2edb30aba130d899dd56b0a63896c85c32b0b575a973f1c75338d0aadf5
                                                                  • Instruction ID: d436865c8641f3ad509055f1ff5e57fdce1fabce12116ffd7048bbd4ebb77642
                                                                  • Opcode Fuzzy Hash: 3807d2edb30aba130d899dd56b0a63896c85c32b0b575a973f1c75338d0aadf5
                                                                  • Instruction Fuzzy Hash: 67319E711082019FD311EF54D885AAFBFE9FFD9354F14092EF581822A1EB719949CB92
                                                                  APIs
                                                                  • GetFileAttributesW.KERNEL32(?,0066CB68), ref: 0063D2FB
                                                                  • GetLastError.KERNEL32 ref: 0063D30A
                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0063D319
                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0066CB68), ref: 0063D376
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 2267087916-0
                                                                  • Opcode ID: b153f85daf6262d6741f4657a74ffbd1b2e2d83fcb44d55a874617f5d42dcc2a
                                                                  • Instruction ID: 224e890e63d52a1a69980855332715b5307c3c9e14803956bf4b848df476342c
                                                                  • Opcode Fuzzy Hash: b153f85daf6262d6741f4657a74ffbd1b2e2d83fcb44d55a874617f5d42dcc2a
                                                                  • Instruction Fuzzy Hash: B6217E705096019FD310DF28E8854AA7BE9EE96724F104A1EF499C33A1DB319E4ACB93
                                                                  APIs
                                                                    • Part of subcall function 00631014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0063102A
                                                                    • Part of subcall function 00631014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00631036
                                                                    • Part of subcall function 00631014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00631045
                                                                    • Part of subcall function 00631014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0063104C
                                                                    • Part of subcall function 00631014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00631062
                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006315BE
                                                                  • _memcmp.LIBVCRUNTIME ref: 006315E1
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00631617
                                                                  • HeapFree.KERNEL32(00000000), ref: 0063161E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                  • String ID:
                                                                  • API String ID: 1592001646-0
                                                                  • Opcode ID: 2796a7357525ba345e636d3830c35274cad38a692e63a791b1547f3595c0f21a
                                                                  • Instruction ID: 96204692e3f4af073c6ffc5fb50372c63f833942bcc05a508376401c59e41bbb
                                                                  • Opcode Fuzzy Hash: 2796a7357525ba345e636d3830c35274cad38a692e63a791b1547f3595c0f21a
                                                                  • Instruction Fuzzy Hash: 3A21AF71E00509EFDF00DFA5C945BEEB7BAEF46354F084469E441AB241E770AE05DBA0
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0066280A
                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00662824
                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00662832
                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00662840
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long$AttributesLayered
                                                                  • String ID:
                                                                  • API String ID: 2169480361-0
                                                                  • Opcode ID: b0b069560c1199767e95b7356a701a80a6653e17b830057a4c498f4d03c4645c
                                                                  • Instruction ID: c1ddd6d2500b34f8e78b10f03763a69c7fe56eaf1529cfbba1ff9d12db188d09
                                                                  • Opcode Fuzzy Hash: b0b069560c1199767e95b7356a701a80a6653e17b830057a4c498f4d03c4645c
                                                                  • Instruction Fuzzy Hash: EE219031205912AFD7149B24CC55FAA7B9AAF85324F14815DF4668B7E2C7B1EC42C7D0
                                                                  APIs
                                                                    • Part of subcall function 00638D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0063790A,?,000000FF,?,00638754,00000000,?,0000001C,?,?), ref: 00638D8C
                                                                    • Part of subcall function 00638D7D: lstrcpyW.KERNEL32(00000000,?,?,0063790A,?,000000FF,?,00638754,00000000,?,0000001C,?,?,00000000), ref: 00638DB2
                                                                    • Part of subcall function 00638D7D: lstrcmpiW.KERNEL32(00000000,?,0063790A,?,000000FF,?,00638754,00000000,?,0000001C,?,?), ref: 00638DE3
                                                                  • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00638754,00000000,?,0000001C,?,?,00000000), ref: 00637923
                                                                  • lstrcpyW.KERNEL32(00000000,?,?,00638754,00000000,?,0000001C,?,?,00000000), ref: 00637949
                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00638754,00000000,?,0000001C,?,?,00000000), ref: 00637984
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcmpilstrcpylstrlen
                                                                  • String ID: cdecl
                                                                  • API String ID: 4031866154-3896280584
                                                                  • Opcode ID: 2576638d4552460715e8374889cf6493d72e054bac9de89131e84fa5424e7788
                                                                  • Instruction ID: c86099e4df867f3ee99863c95f0d737302f7296e6f2843e2512c9f51e4e34e40
                                                                  • Opcode Fuzzy Hash: 2576638d4552460715e8374889cf6493d72e054bac9de89131e84fa5424e7788
                                                                  • Instruction Fuzzy Hash: 0A11E17A200342AFCB259F35C844EBA77AAFF85350B00412AF842CB3A4EB719801C7A1
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00667D0B
                                                                  • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00667D2A
                                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00667D42
                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0064B7AD,00000000), ref: 00667D6B
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long
                                                                  • String ID:
                                                                  • API String ID: 847901565-0
                                                                  • Opcode ID: c1f60ff1c998f549fca43310f798f2494a539de30cbd65f930fab64766a2a800
                                                                  • Instruction ID: 0ab557c8dc2b56ff6e62165ed1b9075f6820345bc726e435c0932fcbf0854906
                                                                  • Opcode Fuzzy Hash: c1f60ff1c998f549fca43310f798f2494a539de30cbd65f930fab64766a2a800
                                                                  • Instruction Fuzzy Hash: 66117231605655AFCB109F28CC04ABA3BAAAF46374F155B24F835DB2F0E731AD51DB50
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00001060,?,00000004), ref: 006656BB
                                                                  • _wcslen.LIBCMT ref: 006656CD
                                                                  • _wcslen.LIBCMT ref: 006656D8
                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00665816
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend_wcslen
                                                                  • String ID:
                                                                  • API String ID: 455545452-0
                                                                  • Opcode ID: 0b733de439959ccf5d07868e1f4b956e1371c9de7540bb4fcaad09cdf8fe0318
                                                                  • Instruction ID: 01a13377cd78ab56c2eb3a521988e13a926187eded50c33770d6d3b0c03ceaf6
                                                                  • Opcode Fuzzy Hash: 0b733de439959ccf5d07868e1f4b956e1371c9de7540bb4fcaad09cdf8fe0318
                                                                  • Instruction Fuzzy Hash: 0711037160060996DF209F61CC86AFE3BADFF11764F10416AF926D6181EBB4DA80CF60
                                                                  APIs
                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00631A47
                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00631A59
                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00631A6F
                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00631A8A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: ea0f1f6237a0611c982f7f5b04e1a6bfd26629404d174fa3c7447ad4bc317a6e
                                                                  • Instruction ID: 34bcedf4cef8becfeb87ced2b23071ca0d14978d27c9ed74bfe4373126f306b2
                                                                  • Opcode Fuzzy Hash: ea0f1f6237a0611c982f7f5b04e1a6bfd26629404d174fa3c7447ad4bc317a6e
                                                                  • Instruction Fuzzy Hash: 1F11393AD01219FFEB10DBA4CD85FADBB79EB09750F200092EA00BB290D6716E50DB94
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0063E1FD
                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 0063E230
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0063E246
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0063E24D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                  • String ID:
                                                                  • API String ID: 2880819207-0
                                                                  • Opcode ID: 61dcd61879f9405c0b890c43dd9cbdf6b0bad36be9c139ebb8a50b92d577dbec
                                                                  • Instruction ID: 9a1ede1cd43702f1e43a020b3a11dfc7d7d42e7a5908099855e4bb03e5c19e66
                                                                  • Opcode Fuzzy Hash: 61dcd61879f9405c0b890c43dd9cbdf6b0bad36be9c139ebb8a50b92d577dbec
                                                                  • Instruction Fuzzy Hash: E8110876904654BBCB01AFA89C19AEF7FAFAB46320F004215F914E33D0D6B19A008BF0
                                                                  APIs
                                                                  • CreateThread.KERNEL32(00000000,?,005FCFF9,00000000,00000004,00000000), ref: 005FD218
                                                                  • GetLastError.KERNEL32 ref: 005FD224
                                                                  • __dosmaperr.LIBCMT ref: 005FD22B
                                                                  • ResumeThread.KERNEL32(00000000), ref: 005FD249
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 173952441-0
                                                                  • Opcode ID: 7695b8a3936d2455dd218a77530ec16c95a1d6eecd9125d8afc97db19ea8f581
                                                                  • Instruction ID: 047098645dbc3e973ae615aad68e057bbb3f01540e932bef9f638cc53e5068b9
                                                                  • Opcode Fuzzy Hash: 7695b8a3936d2455dd218a77530ec16c95a1d6eecd9125d8afc97db19ea8f581
                                                                  • Instruction Fuzzy Hash: EA01803A80560DBBDB116BA5DC09ABB7E7AFF82731F104219FA25961D0DBB58901C6B0
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 005D604C
                                                                  • GetStockObject.GDI32(00000011), ref: 005D6060
                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 005D606A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateMessageObjectSendStockWindow
                                                                  • String ID:
                                                                  • API String ID: 3970641297-0
                                                                  • Opcode ID: 1f8009845728019f687f2190abcc8ba25a1931967092ce1e6a0107a795ca4b65
                                                                  • Instruction ID: 4f9db831795deb15ce2aabeecd303313076910738766a085426d5b6561f112bf
                                                                  • Opcode Fuzzy Hash: 1f8009845728019f687f2190abcc8ba25a1931967092ce1e6a0107a795ca4b65
                                                                  • Instruction Fuzzy Hash: A9118E72101508BFEF225F98CC58AEABF6AFF09364F040107FA1452110C7729C61DB91
                                                                  APIs
                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 005F3B56
                                                                    • Part of subcall function 005F3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 005F3AD2
                                                                    • Part of subcall function 005F3AA3: ___AdjustPointer.LIBCMT ref: 005F3AED
                                                                  • _UnwindNestedFrames.LIBCMT ref: 005F3B6B
                                                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 005F3B7C
                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 005F3BA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                  • String ID:
                                                                  • API String ID: 737400349-0
                                                                  • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                  • Instruction ID: 2e8e7f6edcbb35a034975a3fce74a2296d3d26c3300556e946aa06c036ddff1d
                                                                  • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                  • Instruction Fuzzy Hash: 5201C53210014EBBEF125E95CC4AEEB7F6AFF98754F044015FA4866121C63AE9619BA0
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,005D13C6,00000000,00000000,?,0060301A,005D13C6,00000000,00000000,00000000,?,0060328B,00000006,FlsSetValue), ref: 006030A5
                                                                  • GetLastError.KERNEL32(?,0060301A,005D13C6,00000000,00000000,00000000,?,0060328B,00000006,FlsSetValue,00672290,FlsSetValue,00000000,00000364,?,00602E46), ref: 006030B1
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0060301A,005D13C6,00000000,00000000,00000000,?,0060328B,00000006,FlsSetValue,00672290,FlsSetValue,00000000), ref: 006030BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 3177248105-0
                                                                  • Opcode ID: 5e9badd64de266b9acae1c648eec28b7d95cbcab445b2cef9f1da4ad8619df9d
                                                                  • Instruction ID: 5e85198d93f989791ce62eb5246cec1f97c53c744346cf1e61e2a5405c62dacc
                                                                  • Opcode Fuzzy Hash: 5e9badd64de266b9acae1c648eec28b7d95cbcab445b2cef9f1da4ad8619df9d
                                                                  • Instruction Fuzzy Hash: 9A01F732392732ABCB354B799C449A77B9EAF05B72B104621F947E73C0D721DA02C6E0
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0063747F
                                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00637497
                                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006374AC
                                                                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 006374CA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                                  • String ID:
                                                                  • API String ID: 1352324309-0
                                                                  • Opcode ID: 2e2ff4718e7d88dc5df3053aeeac34754bb0836c7a68febb35b87a11d7b3fb83
                                                                  • Instruction ID: 785a15b7e73cb4094919614026cf489c16ba3f32c543ab3b9850caf44d8f9231
                                                                  • Opcode Fuzzy Hash: 2e2ff4718e7d88dc5df3053aeeac34754bb0836c7a68febb35b87a11d7b3fb83
                                                                  • Instruction Fuzzy Hash: CC11A1F12057149BE730CF54EC08BA27BFEEB00B10F108569E656D6152D7B0F904DB90
                                                                  APIs
                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0063ACD3,?,00008000), ref: 0063B0C4
                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0063ACD3,?,00008000), ref: 0063B0E9
                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0063ACD3,?,00008000), ref: 0063B0F3
                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0063ACD3,?,00008000), ref: 0063B126
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CounterPerformanceQuerySleep
                                                                  • String ID:
                                                                  • API String ID: 2875609808-0
                                                                  • Opcode ID: 9798e215e27d5cbf3aefaeebe3a01d38fcbebf301dd469c50244b129051baa19
                                                                  • Instruction ID: fc639010470c4e08c0334ce0fd4f0d0ba4e5681b48e7b9b58c9986f709f3d313
                                                                  • Opcode Fuzzy Hash: 9798e215e27d5cbf3aefaeebe3a01d38fcbebf301dd469c50244b129051baa19
                                                                  • Instruction Fuzzy Hash: 4211A130C0091DD7CF04AFE4E9586FEBF79FF0A310F005085DA81B6245CB7055508B91
                                                                  APIs
                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00632DC5
                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00632DD6
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00632DDD
                                                                  • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00632DE4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                  • String ID:
                                                                  • API String ID: 2710830443-0
                                                                  • Opcode ID: 09326d93d4fea2454aa2a91ad71edc359f36d6993a5630d7864c7dab3bf08f25
                                                                  • Instruction ID: 33dd2fb42d4b6a75bd1ca6b05174d9083e81c17f964e0b21d632d08e106aca6d
                                                                  • Opcode Fuzzy Hash: 09326d93d4fea2454aa2a91ad71edc359f36d6993a5630d7864c7dab3bf08f25
                                                                  • Instruction Fuzzy Hash: 6EE06D71101A247ADB202B63DC0DEFB7E6EEF42BB1F001015F106D10809AE19841D6F0
                                                                  APIs
                                                                    • Part of subcall function 005E9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005E9693
                                                                    • Part of subcall function 005E9639: SelectObject.GDI32(?,00000000), ref: 005E96A2
                                                                    • Part of subcall function 005E9639: BeginPath.GDI32(?), ref: 005E96B9
                                                                    • Part of subcall function 005E9639: SelectObject.GDI32(?,00000000), ref: 005E96E2
                                                                  • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00668887
                                                                  • LineTo.GDI32(?,?,?), ref: 00668894
                                                                  • EndPath.GDI32(?), ref: 006688A4
                                                                  • StrokePath.GDI32(?), ref: 006688B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                  • String ID:
                                                                  • API String ID: 1539411459-0
                                                                  • Opcode ID: 0a1b10da62eb212acf73720382b4ff200cd683c3373c7bbc4e7acdbd7189ab5c
                                                                  • Instruction ID: 32a2bef9fbc4a3c98e301e1901cfa415da6f9bcecc5deedc3efea6ccf5344ace
                                                                  • Opcode Fuzzy Hash: 0a1b10da62eb212acf73720382b4ff200cd683c3373c7bbc4e7acdbd7189ab5c
                                                                  • Instruction Fuzzy Hash: DEF05E36041659FADB126F94AC0DFDE3F5AAF0A320F048100FA51661E1C7B55511CFE5
                                                                  APIs
                                                                  • GetSysColor.USER32(00000008), ref: 005E98CC
                                                                  • SetTextColor.GDI32(?,?), ref: 005E98D6
                                                                  • SetBkMode.GDI32(?,00000001), ref: 005E98E9
                                                                  • GetStockObject.GDI32(00000005), ref: 005E98F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Color$ModeObjectStockText
                                                                  • String ID:
                                                                  • API String ID: 4037423528-0
                                                                  • Opcode ID: 9c5f453bfcb43e1e0d8872b698df8577ca8b7b3a666cc9f6d9afedb2f5b7d445
                                                                  • Instruction ID: 8d2af7892eb1b3765c0781f5782f2ef160d8a259e7b75cb1d088376722bac863
                                                                  • Opcode Fuzzy Hash: 9c5f453bfcb43e1e0d8872b698df8577ca8b7b3a666cc9f6d9afedb2f5b7d445
                                                                  • Instruction Fuzzy Hash: E0E06531244A80AADB215F78BC09BE97F52AB12335F049219F6FA940E1C7B146509F11
                                                                  APIs
                                                                  • GetCurrentThread.KERNEL32 ref: 00631634
                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,006311D9), ref: 0063163B
                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006311D9), ref: 00631648
                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,006311D9), ref: 0063164F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                  • String ID:
                                                                  • API String ID: 3974789173-0
                                                                  • Opcode ID: 70088db9da140307b3913abb5a8c67aadc4738c28fbb4ebbb7a88c3cbe3b57bc
                                                                  • Instruction ID: 2c84387f51d553a0066eea0fa63cb323439a27f3966dc19dc8e1c9e576c1f133
                                                                  • Opcode Fuzzy Hash: 70088db9da140307b3913abb5a8c67aadc4738c28fbb4ebbb7a88c3cbe3b57bc
                                                                  • Instruction Fuzzy Hash: C5E08631601611EBD7201FE19D0DFA63B7EAF467A1F144808F685DD080D6B54440C790
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 0062D858
                                                                  • GetDC.USER32(00000000), ref: 0062D862
                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0062D882
                                                                  • ReleaseDC.USER32(?), ref: 0062D8A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                  • String ID:
                                                                  • API String ID: 2889604237-0
                                                                  • Opcode ID: 5db9c0863c413274801ee1d3dcffe49e1c6745b7ff7af1d29a8de39d5482cabf
                                                                  • Instruction ID: 493ab8c2829fd371b0b018db4f1264ec927950bfe8f9e0e973ac5fe37712d6c9
                                                                  • Opcode Fuzzy Hash: 5db9c0863c413274801ee1d3dcffe49e1c6745b7ff7af1d29a8de39d5482cabf
                                                                  • Instruction Fuzzy Hash: 9FE01AB5800605EFCB419FA0D80C67DBFB2FB08320F14A40AE88AE7350C7B95901AF54
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 0062D86C
                                                                  • GetDC.USER32(00000000), ref: 0062D876
                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0062D882
                                                                  • ReleaseDC.USER32(?), ref: 0062D8A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                  • String ID:
                                                                  • API String ID: 2889604237-0
                                                                  • Opcode ID: 9578bec4d519ceec8593cb8befc588b06d41212ab12e8d504976de680d586778
                                                                  • Instruction ID: 82f60a94e3acb8b4015d633d24d56356f8516aacfa7097f33516ff7620f9e7d8
                                                                  • Opcode Fuzzy Hash: 9578bec4d519ceec8593cb8befc588b06d41212ab12e8d504976de680d586778
                                                                  • Instruction Fuzzy Hash: D9E012B0800601EFCB50AFA0D80C66DBFB2FB08320B14A40AE88AE7350CBB95901AF54
                                                                  APIs
                                                                    • Part of subcall function 005D7620: _wcslen.LIBCMT ref: 005D7625
                                                                  • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00644ED4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Connection_wcslen
                                                                  • String ID: *$LPT
                                                                  • API String ID: 1725874428-3443410124
                                                                  • Opcode ID: 80d4f173a379815a4d52f0501f96b364d7e82e633672e63409dc36d438f2c436
                                                                  • Instruction ID: 94ed937bf255bcffbc256496a4c4f069278a567468cd52a5b3c85054b57553a5
                                                                  • Opcode Fuzzy Hash: 80d4f173a379815a4d52f0501f96b364d7e82e633672e63409dc36d438f2c436
                                                                  • Instruction Fuzzy Hash: BE917275A002059FCB14DF58C485FA9BBF6BF88304F158099E80A9F362DB31ED85CB91
                                                                  APIs
                                                                  • __startOneArgErrorHandling.LIBCMT ref: 005FE30D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorHandling__start
                                                                  • String ID: pow
                                                                  • API String ID: 3213639722-2276729525
                                                                  • Opcode ID: b2809b64004147b40e563ecf8fcc3c7ef64470ab0a59e18c9640e4af2000c140
                                                                  • Instruction ID: 7a5e67792f688acf887fa66125a9f8b82a589b11bb5af4974b1f3f419e928cf1
                                                                  • Opcode Fuzzy Hash: b2809b64004147b40e563ecf8fcc3c7ef64470ab0a59e18c9640e4af2000c140
                                                                  • Instruction Fuzzy Hash: F8514B61E8D20696CB1D7718CD063BB2FA6BF40740F304D59E1D5463F9EB38ACD19A46
                                                                  APIs
                                                                  • CharUpperBuffW.USER32(0062569E,00000000,?,0066CC08,?,00000000,00000000), ref: 006578DD
                                                                    • Part of subcall function 005D6B57: _wcslen.LIBCMT ref: 005D6B6A
                                                                  • CharUpperBuffW.USER32(0062569E,00000000,?,0066CC08,00000000,?,00000000,00000000), ref: 0065783B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharUpper$_wcslen
                                                                  • String ID: <si
                                                                  • API String ID: 3544283678-3796645423
                                                                  • Opcode ID: bd807c989335d60881be84634166725dad6fa18d2230c0796a1bd10b1333f727
                                                                  • Instruction ID: ceaf47e95b89bfb1da9e955d901a60e33fdc9c317a97c337c96c8f5d3c74ee13
                                                                  • Opcode Fuzzy Hash: bd807c989335d60881be84634166725dad6fa18d2230c0796a1bd10b1333f727
                                                                  • Instruction Fuzzy Hash: 6D61707291411AABCF14EBA8DC95DFDBB79BF54301F440527F942A3291EF305A0ACBA0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: #
                                                                  • API String ID: 0-1885708031
                                                                  • Opcode ID: dc802a5c427044f2d405d6869464020c1a58bc452300fa2bd9228256086602d5
                                                                  • Instruction ID: 727f899d93880361ad7efbd0a8002873808f73c8cea7a01d3345938fb525dbe5
                                                                  • Opcode Fuzzy Hash: dc802a5c427044f2d405d6869464020c1a58bc452300fa2bd9228256086602d5
                                                                  • Instruction Fuzzy Hash: 5A514639600296DFDB18DF68D4466FA7FAAFF55310F248066E8919B3C0D6359D42CBA0
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000), ref: 005EF2A2
                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 005EF2BB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemorySleepStatus
                                                                  • String ID: @
                                                                  • API String ID: 2783356886-2766056989
                                                                  • Opcode ID: bfb0cfaea92d07913273b7660ebbe0e5c8c53cabae7ef7895d8e0ffb918c2363
                                                                  • Instruction ID: 9a4f3355188a16a2f54b0e23b28dc2c050c0574c20b989200415dac7bb2d007f
                                                                  • Opcode Fuzzy Hash: bfb0cfaea92d07913273b7660ebbe0e5c8c53cabae7ef7895d8e0ffb918c2363
                                                                  • Instruction Fuzzy Hash: 90513B714087469BD320AF14DC8ABABBBF8FBC5300F81885EF1D941295EB709529CB66
                                                                  APIs
                                                                  • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 006557E0
                                                                  • _wcslen.LIBCMT ref: 006557EC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharUpper_wcslen
                                                                  • String ID: CALLARGARRAY
                                                                  • API String ID: 157775604-1150593374
                                                                  • Opcode ID: 7ac5e94867a3a3571273a36566303ba495aeb399865c0afce3354d15533d23b5
                                                                  • Instruction ID: 32165a254b4e75e64def41b3a04cd784408f040ac24938e882f6415dae9171d3
                                                                  • Opcode Fuzzy Hash: 7ac5e94867a3a3571273a36566303ba495aeb399865c0afce3354d15533d23b5
                                                                  • Instruction Fuzzy Hash: C741C431E002199FCB14DFA9C8999FEBBB6FF59321F10402AE806A7351E7719D85CB90
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 0064D130
                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0064D13A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CrackInternet_wcslen
                                                                  • String ID: |
                                                                  • API String ID: 596671847-2343686810
                                                                  • Opcode ID: b10d033532b8712f380e3bc684a25ac8874f8f04cc90cc8831796236225333ca
                                                                  • Instruction ID: e803660c1f9dc4e57d100463858c6151cb071782d65e211e9667a53ad0a4bdd7
                                                                  • Opcode Fuzzy Hash: b10d033532b8712f380e3bc684a25ac8874f8f04cc90cc8831796236225333ca
                                                                  • Instruction Fuzzy Hash: AC312C75D0020AABCF15EFA4CC89AEF7FBAFF44300F00001AF915A6261D731AA06DB50
                                                                  APIs
                                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00663621
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0066365C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$DestroyMove
                                                                  • String ID: static
                                                                  • API String ID: 2139405536-2160076837
                                                                  • Opcode ID: 0dfed3d61adf8d9ec48c088f4b6bbb27ee5a11c0afe0b482b49ba070ab422a9a
                                                                  • Instruction ID: 9b65a9ce59b2b12fb17f06765436d136ee147960fa5d50c325eff8eaa9eafa0e
                                                                  • Opcode Fuzzy Hash: 0dfed3d61adf8d9ec48c088f4b6bbb27ee5a11c0afe0b482b49ba070ab422a9a
                                                                  • Instruction Fuzzy Hash: E4318D71100614AEDB209F78DC80EFB77AAFF89724F00961AF9A5D7390DA71AD81C760
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                    • Part of subcall function 005E9944: GetWindowLongW.USER32(?,000000EB), ref: 005E9952
                                                                  • GetParent.USER32(?), ref: 006273A3
                                                                  • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 0062742D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$ParentProc
                                                                  • String ID: h\
                                                                  • API String ID: 2181805148-2592641360
                                                                  • Opcode ID: 2e944879fc79754d7e6e874d4cdb2b18ed712879c428205a0397550dd072b3a9
                                                                  • Instruction ID: ee8077af5791440cd44eede9b59d2e3e068a645819db41b4a79dd0be7c6c904f
                                                                  • Opcode Fuzzy Hash: 2e944879fc79754d7e6e874d4cdb2b18ed712879c428205a0397550dd072b3a9
                                                                  • Instruction Fuzzy Hash: 9F219C30608554AFCB29AF2AD849DE93FA6FF4B370F144255F9A54B2B2C3309D11EA50
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0066327C
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00663287
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: Combobox
                                                                  • API String ID: 3850602802-2096851135
                                                                  • Opcode ID: fe1cc8e53873b9b74c5756c91ffdd992c806ac3fb195192fa1c94940ec98058c
                                                                  • Instruction ID: 528b9868fcfce7d314f2f73caeecc6089c0fa47b43970ddcd1658cd380c8b7b4
                                                                  • Opcode Fuzzy Hash: fe1cc8e53873b9b74c5756c91ffdd992c806ac3fb195192fa1c94940ec98058c
                                                                  • Instruction Fuzzy Hash: F71190712002197FEF219F54DC94EFB3BAFEB953A4F104129F91897390D6719E518760
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: 8$HANDLE
                                                                  • API String ID: 176396367-2771860893
                                                                  • Opcode ID: 48deb52f5dcb1a1ec2d68bc8dc9d77364c80f45fa2f2292cbd0477775692746a
                                                                  • Instruction ID: 5f24f30f91b3f64cff432a611f923f0bed073447f02373e367ceb90d1e4e5894
                                                                  • Opcode Fuzzy Hash: 48deb52f5dcb1a1ec2d68bc8dc9d77364c80f45fa2f2292cbd0477775692746a
                                                                  • Instruction Fuzzy Hash: 3E1126715101149BE7189F14D889BFDB3AAEF80725F60406EE000CE1C4E7F29E818BA4
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CreateMenuPopup
                                                                  • String ID: h\
                                                                  • API String ID: 3826294624-2592641360
                                                                  • Opcode ID: 145becb2bbed15bd207ecbd1cdd2e405b7ce8a6080aa415e7782fd1a12a1116e
                                                                  • Instruction ID: 7ae5da13648b8caccf8452ac8a1d44c0b67245ca1a7bb72167b2f5af556c6772
                                                                  • Opcode Fuzzy Hash: 145becb2bbed15bd207ecbd1cdd2e405b7ce8a6080aa415e7782fd1a12a1116e
                                                                  • Instruction Fuzzy Hash: FC216D346047549FCB20CF29C495BD6BBEAFB0A364F08806AE9999B351D331AE02CF51
                                                                  APIs
                                                                    • Part of subcall function 005D600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 005D604C
                                                                    • Part of subcall function 005D600E: GetStockObject.GDI32(00000011), ref: 005D6060
                                                                    • Part of subcall function 005D600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 005D606A
                                                                  • GetWindowRect.USER32(00000000,?), ref: 0066377A
                                                                  • GetSysColor.USER32(00000012), ref: 00663794
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                  • String ID: static
                                                                  • API String ID: 1983116058-2160076837
                                                                  • Opcode ID: ea26ca10ba81232b2822a47f5ad7b4362d59a25e3d5220030056a64cbff5e68d
                                                                  • Instruction ID: d5652f840495f702c57034211704e83441a272fa8c78566370237e7d57e377e2
                                                                  • Opcode Fuzzy Hash: ea26ca10ba81232b2822a47f5ad7b4362d59a25e3d5220030056a64cbff5e68d
                                                                  • Instruction Fuzzy Hash: 2C1159B261021AAFDB00DFA8CC45AFA7BB9FB09314F004515F956E2250E775E8519B50
                                                                  APIs
                                                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 006661FC
                                                                  • SendMessageW.USER32(?,00000194,00000000,00000000), ref: 00666225
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: h\
                                                                  • API String ID: 3850602802-2592641360
                                                                  • Opcode ID: e1d3c345918a882ae85a91fb44e9659b4939164216d18cf907d702427fc57733
                                                                  • Instruction ID: 059bf96ef5706fd59af026fb05cfccf75eb98d6cc4901a460607b6820a5a7e8f
                                                                  • Opcode Fuzzy Hash: e1d3c345918a882ae85a91fb44e9659b4939164216d18cf907d702427fc57733
                                                                  • Instruction Fuzzy Hash: 8F11B271150214BEEB108F68EC29FFA3BAEEB06314F004115FA16AA2D1D2B1DF01DB50
                                                                  APIs
                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0064CD7D
                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0064CDA6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Internet$OpenOption
                                                                  • String ID: <local>
                                                                  • API String ID: 942729171-4266983199
                                                                  • Opcode ID: 43c76cc4c269167d8268ab0b6acf6b821e3e364df6c67a0981bc4274b3754015
                                                                  • Instruction ID: 282a98c129ebad29eb54a8f9b9b47b21b1ac18219b9857fe095b7ea02152346d
                                                                  • Opcode Fuzzy Hash: 43c76cc4c269167d8268ab0b6acf6b821e3e364df6c67a0981bc4274b3754015
                                                                  • Instruction Fuzzy Hash: D0110271A06631BAD7785B66CC48EF3BEAEEF527B4F00422AB10983280D3709841D6F0
                                                                  APIs
                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 006634AB
                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006634BA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LengthMessageSendTextWindow
                                                                  • String ID: edit
                                                                  • API String ID: 2978978980-2167791130
                                                                  • Opcode ID: be62c57fd83bc365cff49d8ea6c6e2749b40804156551a890137cd5e9b5d96cc
                                                                  • Instruction ID: 4badd019862002f64fc0c124d44a377c546a52059c042e8e3aed698d1a17fb76
                                                                  • Opcode Fuzzy Hash: be62c57fd83bc365cff49d8ea6c6e2749b40804156551a890137cd5e9b5d96cc
                                                                  • Instruction Fuzzy Hash: DC119D71100118ABEB114E64DC44AFA77ABEB05374F504324F961933E0CB71EC919B50
                                                                  APIs
                                                                  • SendMessageW.USER32(?,?,?,?), ref: 00664FCC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: h\
                                                                  • API String ID: 3850602802-2592641360
                                                                  • Opcode ID: 7b9ef966ee2b9ed43f598e0201363378914bd1854d218f81193e69cda6bcd3ef
                                                                  • Instruction ID: 5b5c8c730733b0faf1ff7bd72d56975ec55da235cdcb9171f172888156b36afc
                                                                  • Opcode Fuzzy Hash: 7b9ef966ee2b9ed43f598e0201363378914bd1854d218f81193e69cda6bcd3ef
                                                                  • Instruction Fuzzy Hash: F921E47660011AEFCB15DFA8C9418EA7BB6FB4D354B004155FD06A7310D731ED21DB90
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  • CharUpperBuffW.USER32(?,?,?), ref: 00636CB6
                                                                  • _wcslen.LIBCMT ref: 00636CC2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$BuffCharUpper
                                                                  • String ID: STOP
                                                                  • API String ID: 1256254125-2411985666
                                                                  • Opcode ID: f145ebc9b87c12477a7700761c4f900f76bda7a01abd0043d3fce8da0df7cc2b
                                                                  • Instruction ID: 8992c3be68ae3c92b570fdcce7aa707b6141bad56d68b93a2485bdcf04312cce
                                                                  • Opcode Fuzzy Hash: f145ebc9b87c12477a7700761c4f900f76bda7a01abd0043d3fce8da0df7cc2b
                                                                  • Instruction Fuzzy Hash: 4D010432600527AACB209FBDDC858FF77BAFFA1714F004529F85296291EA31D800C790
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: h\
                                                                  • API String ID: 0-2592641360
                                                                  • Opcode ID: 17b7aaf78029a42417394e15f0064a1b10732e362ffc322e6340f2672a301254
                                                                  • Instruction ID: 9100517998322c6eb84b8dab0cc50d7ef61fb75af988053011f33e86de78b9d0
                                                                  • Opcode Fuzzy Hash: 17b7aaf78029a42417394e15f0064a1b10732e362ffc322e6340f2672a301254
                                                                  • Instruction Fuzzy Hash: 2B113D74604A14AFCB20DF19D850EA577E7FB9A320F148259F9658B3A0C771F945CF90
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                    • Part of subcall function 00633CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00633CCA
                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00631C46
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                  • String ID: ComboBox$ListBox
                                                                  • API String ID: 624084870-1403004172
                                                                  • Opcode ID: a001befbfa5a28d0b6ecd240be08be1710ba5f4d88045680761648734c894ce1
                                                                  • Instruction ID: 1961109c5bedb3dea7ea28458cec41e778ea51edee17408fb4c661109b179106
                                                                  • Opcode Fuzzy Hash: a001befbfa5a28d0b6ecd240be08be1710ba5f4d88045680761648734c894ce1
                                                                  • Instruction Fuzzy Hash: CD01F77178010566CF14EBA4CA559FF77AAAB52340F10102BB40667381EA249E0887F1
                                                                  APIs
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                    • Part of subcall function 00633CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00633CCA
                                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00631CC8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                  • String ID: ComboBox$ListBox
                                                                  • API String ID: 624084870-1403004172
                                                                  • Opcode ID: e32ed43d97b06000dc176e44463be9b84d3cb0dd9b0ba13bda93a39a77da6ee5
                                                                  • Instruction ID: 516e0aaf9cc7e1862db2cf410709ef169521a6159b253cc7cb801d10e11d935b
                                                                  • Opcode Fuzzy Hash: e32ed43d97b06000dc176e44463be9b84d3cb0dd9b0ba13bda93a39a77da6ee5
                                                                  • Instruction Fuzzy Hash: 4401D671B8011967CF14EBA4CA15AFE77AEAF12340F14101BB80277381EA649F09D6B2
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 005EA529
                                                                    • Part of subcall function 005D9CB3: _wcslen.LIBCMT ref: 005D9CBD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Init_thread_footer_wcslen
                                                                  • String ID: ,%j$3yb
                                                                  • API String ID: 2551934079-1169086100
                                                                  • Opcode ID: f1dac6b653aff34ab50ba1687a77cea148db87706a6a86c71fea3a58e46f5f90
                                                                  • Instruction ID: 163e2fdfe1d5de04a6a08b2b408b9388cfeeb92e0577b802fb2c22407e144afd
                                                                  • Opcode Fuzzy Hash: f1dac6b653aff34ab50ba1687a77cea148db87706a6a86c71fea3a58e46f5f90
                                                                  • Instruction Fuzzy Hash: 8B014731B4066687CA18F77DE85FAAC3F55BB86710F441466F541172C3DE107D018A97
                                                                  APIs
                                                                    • Part of subcall function 00602D74: GetLastError.KERNEL32(?,?,00605686,00613CD6,?,00000000,?,00605B6A,?,?,?,?,?,005FE6D1,?,00698A48), ref: 00602D78
                                                                    • Part of subcall function 00602D74: _free.LIBCMT ref: 00602DAB
                                                                    • Part of subcall function 00602D74: SetLastError.KERNEL32(00000000,?,?,?,?,005FE6D1,?,00698A48,00000010,005D4F4A,?,?,00000000,00613CD6), ref: 00602DEC
                                                                    • Part of subcall function 00602D74: _abort.LIBCMT ref: 00602DF2
                                                                  • _abort.LIBCMT ref: 0060CB0C
                                                                  • _free.LIBCMT ref: 0060CB40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast_abort_free
                                                                  • String ID: H
                                                                  • API String ID: 289325740-69643886
                                                                  • Opcode ID: 37210edd4483316319de986978fc40a96e43feeba911659e0dd7125f04b9c643
                                                                  • Instruction ID: 0a0b13ef056c8e9499e0325f0f31fa93c7f9870b88bc56524e9d6a6296058e46
                                                                  • Opcode Fuzzy Hash: 37210edd4483316319de986978fc40a96e43feeba911659e0dd7125f04b9c643
                                                                  • Instruction Fuzzy Hash: 9C01AD31D81A229BCB29AF1C884226EB776BF04B70B55430AE950A37C1C7342E01DFC5
                                                                  APIs
                                                                    • Part of subcall function 005E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005E9BB2
                                                                  • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0062769C,?,?,?), ref: 00669111
                                                                    • Part of subcall function 005E9944: GetWindowLongW.USER32(?,000000EB), ref: 005E9952
                                                                  • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 006690F7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$MessageProcSend
                                                                  • String ID: h\
                                                                  • API String ID: 982171247-2592641360
                                                                  • Opcode ID: 28d2775b875f07ca8a661383db4e578cf0c406a612ce425940b829b1804b0300
                                                                  • Instruction ID: 5332870e4a5b1ace66c749d091cdd943b67af5928a884ec8f9cc0ff13587b067
                                                                  • Opcode Fuzzy Hash: 28d2775b875f07ca8a661383db4e578cf0c406a612ce425940b829b1804b0300
                                                                  • Instruction Fuzzy Hash: 4D01DF34104205ABDB21AF14DC49FA67BABFF87365F200069FD910B2E1CB726C51DB64
                                                                  APIs
                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006A3018,006A305C), ref: 006681BF
                                                                  • CloseHandle.KERNEL32 ref: 006681D1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcess
                                                                  • String ID: \0j
                                                                  • API String ID: 3712363035-3905335411
                                                                  • Opcode ID: 5a2eff4a058567355ffa18e604622c7230494b1782fb29b85c49e41078b4948e
                                                                  • Instruction ID: 64e74cf36d77c5b293ca81b1626b7c7f7df2945441ad60e42fd7d0498ceeeb15
                                                                  • Opcode Fuzzy Hash: 5a2eff4a058567355ffa18e604622c7230494b1782fb29b85c49e41078b4948e
                                                                  • Instruction Fuzzy Hash: A5F054F1640314BEE3107B656C45FB77E5EEB06754F005421FB08D52A1D6799E008BB4
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: 3, 3, 16, 1
                                                                  • API String ID: 176396367-3042988571
                                                                  • Opcode ID: 249695010ce50864fcb3acae5970f5e486d1447f6c4a61c4cce53486b361105c
                                                                  • Instruction ID: af1e9f6c6461ea562d2edbbb0662c2093a052d1ed41dfab013f3552b604645ff
                                                                  • Opcode Fuzzy Hash: 249695010ce50864fcb3acae5970f5e486d1447f6c4a61c4cce53486b361105c
                                                                  • Instruction Fuzzy Hash: 36E02B023142211093311279FDC59BF5ACFDFC5752B14182FFE85C2366EAD88D9593A0
                                                                  APIs
                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00630B23
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Message
                                                                  • String ID: AutoIt$Error allocating memory.
                                                                  • API String ID: 2030045667-4017498283
                                                                  • Opcode ID: 42405247f846fd168619591d8a2bff60a8809bd94f1901b0252e5d3528cff5e6
                                                                  • Instruction ID: 8b9b753d83a1a5711c8873ef792abdfe3540a690aa058e97f43baaa83e83f993
                                                                  • Opcode Fuzzy Hash: 42405247f846fd168619591d8a2bff60a8809bd94f1901b0252e5d3528cff5e6
                                                                  • Instruction Fuzzy Hash: 8FE0D83124474926D31437557C07F997E899F05B20F100427F7C8955C38ED2645007E9
                                                                  APIs
                                                                    • Part of subcall function 005EF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,005F0D71,?,?,?,005D100A), ref: 005EF7CE
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,005D100A), ref: 005F0D75
                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,005D100A), ref: 005F0D84
                                                                  Strings
                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005F0D7F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                  • API String ID: 55579361-631824599
                                                                  • Opcode ID: 990600f77073500f70ab834aa79962b1c31000115910898e97a086a3885ffa64
                                                                  • Instruction ID: e03c2c46f0d8dc6b71d08411ae632ebbb66aa76ea423d81297cc3b7610f6bedf
                                                                  • Opcode Fuzzy Hash: 990600f77073500f70ab834aa79962b1c31000115910898e97a086a3885ffa64
                                                                  • Instruction Fuzzy Hash: C7E06D742007518BD7309FBCE4083667FE6BB04744F04992EE982C6692EBB6E4448B91
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 005EE3D5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Init_thread_footer
                                                                  • String ID: 0%j$8%j
                                                                  • API String ID: 1385522511-4048573861
                                                                  • Opcode ID: 2b218949b600adb177a07ac321b1717ad6f724781c7b95d1c915623ebe030ff8
                                                                  • Instruction ID: ff4221804de93a5cb59658d27f7acd750bae99986a337a5efbeac198952448c4
                                                                  • Opcode Fuzzy Hash: 2b218949b600adb177a07ac321b1717ad6f724781c7b95d1c915623ebe030ff8
                                                                  • Instruction Fuzzy Hash: 47E02635CA0956CBC70CBB1DF87AA98BB93BB4E320B102965E142875D29B343C418E54
                                                                  APIs
                                                                  • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0064302F
                                                                  • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00643044
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: Temp$FileNamePath
                                                                  • String ID: aut
                                                                  • API String ID: 3285503233-3010740371
                                                                  • Opcode ID: 3f91d474bf3a1fd5f9eea40c334500c31d4fc57d925b7aefa84b9028a59c07dd
                                                                  • Instruction ID: c24454339bb40827f6aab72caeb39d105decb2c8b72e37f8d6b6eaddeb545e62
                                                                  • Opcode Fuzzy Hash: 3f91d474bf3a1fd5f9eea40c334500c31d4fc57d925b7aefa84b9028a59c07dd
                                                                  • Instruction Fuzzy Hash: 6BD05B7150031467DB209794DC0DFD73A6CD704760F000151BA95D2091DAF49644CAD0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: LocalTime
                                                                  • String ID: %.3d$X64
                                                                  • API String ID: 481472006-1077770165
                                                                  • Opcode ID: e886ce776387450fb963685b7694386224ec380c92d5bf8df137de9bf28950a1
                                                                  • Instruction ID: bdd9836331a5055bd8946272a744a67592491019d08795661557d15a2432d020
                                                                  • Opcode Fuzzy Hash: e886ce776387450fb963685b7694386224ec380c92d5bf8df137de9bf28950a1
                                                                  • Instruction Fuzzy Hash: 6AD0127180A529E9CB5097E0EC498B9B77DBB18301F608452FE4691040E624C709AF61
                                                                  APIs
                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0066236C
                                                                  • PostMessageW.USER32(00000000), ref: 00662373
                                                                    • Part of subcall function 0063E97B: Sleep.KERNEL32 ref: 0063E9F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FindMessagePostSleepWindow
                                                                  • String ID: Shell_TrayWnd
                                                                  • API String ID: 529655941-2988720461
                                                                  • Opcode ID: b860539ec58df242b55be1acf29e49c25fcfe8e3249e717da82a6c3639850e78
                                                                  • Instruction ID: 473631f5830b7befdf90c23d1ff26fad91bdaa7d6fc83fe90b27dd9b90f0a77b
                                                                  • Opcode Fuzzy Hash: b860539ec58df242b55be1acf29e49c25fcfe8e3249e717da82a6c3639850e78
                                                                  • Instruction Fuzzy Hash: 6DD0C9323817507AEAA4B770EC0FFD66A1A9B04B20F015916B686EA1D0C9E0A8018A58
                                                                  APIs
                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0066232C
                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0066233F
                                                                    • Part of subcall function 0063E97B: Sleep.KERNEL32 ref: 0063E9F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2026921809.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2026908585.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.000000000066C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2026967069.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027004234.000000000069C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2027039186.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5d0000_shipping documents.jbxd
                                                                  Similarity
                                                                  • API ID: FindMessagePostSleepWindow
                                                                  • String ID: Shell_TrayWnd
                                                                  • API String ID: 529655941-2988720461
                                                                  • Opcode ID: 4cfa5f9f071c49f509e87e9e25ec398a85a15dc0ec411adce4b79ae29d81851d
                                                                  • Instruction ID: af32c21afc9ace9d2fc1eb65a6f68437cd72d7111c4486f496dceaad0123d765
                                                                  • Opcode Fuzzy Hash: 4cfa5f9f071c49f509e87e9e25ec398a85a15dc0ec411adce4b79ae29d81851d
                                                                  • Instruction Fuzzy Hash: 73D01236394750B7EBA4B770EC0FFD67A1A9B04B20F015916B786EA1D0C9F0A801CB58